May 15 00:46:26.832864 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 14 23:14:51 -00 2025 May 15 00:46:26.832888 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:46:26.832913 kernel: BIOS-provided physical RAM map: May 15 00:46:26.832921 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 00:46:26.832929 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 00:46:26.832937 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 00:46:26.832947 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 15 00:46:26.832955 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 00:46:26.832963 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 00:46:26.832973 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 00:46:26.832981 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 15 00:46:26.832989 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 00:46:26.832997 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 00:46:26.833006 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 00:46:26.833023 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 00:46:26.833038 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 00:46:26.833046 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 00:46:26.833055 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 00:46:26.833063 kernel: NX (Execute Disable) protection: active May 15 00:46:26.833072 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 00:46:26.833081 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 00:46:26.833090 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 00:46:26.833098 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 00:46:26.833106 kernel: extended physical RAM map: May 15 00:46:26.833114 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 00:46:26.833136 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 00:46:26.833144 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 00:46:26.833152 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 15 00:46:26.833159 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 00:46:26.833167 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 00:46:26.833175 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 00:46:26.833183 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 15 00:46:26.833191 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 15 00:46:26.833199 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 15 00:46:26.833207 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 15 00:46:26.833214 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 15 00:46:26.833248 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 00:46:26.833256 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 00:46:26.833263 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 00:46:26.833270 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 00:46:26.833288 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 00:46:26.833296 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 00:46:26.833305 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 00:46:26.833315 kernel: efi: EFI v2.70 by EDK II May 15 00:46:26.833324 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 15 00:46:26.833333 kernel: random: crng init done May 15 00:46:26.833342 kernel: SMBIOS 2.8 present. May 15 00:46:26.833362 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 15 00:46:26.833371 kernel: Hypervisor detected: KVM May 15 00:46:26.833380 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 00:46:26.833389 kernel: kvm-clock: cpu 0, msr 5e196001, primary cpu clock May 15 00:46:26.833398 kernel: kvm-clock: using sched offset of 4263008262 cycles May 15 00:46:26.833409 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 00:46:26.833419 kernel: tsc: Detected 2794.746 MHz processor May 15 00:46:26.833435 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 00:46:26.833448 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 00:46:26.833458 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 15 00:46:26.833467 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 00:46:26.833476 kernel: Using GB pages for direct mapping May 15 00:46:26.833485 kernel: Secure boot disabled May 15 00:46:26.833494 kernel: ACPI: Early table checksum verification disabled May 15 00:46:26.833505 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 15 00:46:26.833526 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 15 00:46:26.833543 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:46:26.833552 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:46:26.833564 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 15 00:46:26.833573 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:46:26.833582 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:46:26.833600 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:46:26.833613 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 00:46:26.833625 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 15 00:46:26.833633 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 15 00:46:26.833654 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 15 00:46:26.833664 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 15 00:46:26.833673 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 15 00:46:26.833682 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 15 00:46:26.833691 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 15 00:46:26.833715 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 15 00:46:26.833726 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 15 00:46:26.833737 kernel: No NUMA configuration found May 15 00:46:26.833746 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 15 00:46:26.833767 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 15 00:46:26.833776 kernel: Zone ranges: May 15 00:46:26.833786 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 00:46:26.833795 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 15 00:46:26.833815 kernel: Normal empty May 15 00:46:26.833825 kernel: Movable zone start for each node May 15 00:46:26.833834 kernel: Early memory node ranges May 15 00:46:26.833863 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 15 00:46:26.833877 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 15 00:46:26.833887 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 15 00:46:26.833896 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 15 00:46:26.833913 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 15 00:46:26.833926 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 15 00:46:26.833935 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 15 00:46:26.833945 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 00:46:26.833965 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 15 00:46:26.833974 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 15 00:46:26.833986 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 00:46:26.833995 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 15 00:46:26.834004 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 15 00:46:26.834021 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 15 00:46:26.834035 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 00:46:26.834044 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 00:46:26.834053 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 00:46:26.834063 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 00:46:26.834072 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 00:46:26.834095 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 00:46:26.834104 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 00:46:26.834114 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 00:46:26.834123 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 00:46:26.834143 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 15 00:46:26.834153 kernel: TSC deadline timer available May 15 00:46:26.834162 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 15 00:46:26.834171 kernel: kvm-guest: KVM setup pv remote TLB flush May 15 00:46:26.834180 kernel: kvm-guest: setup PV sched yield May 15 00:46:26.834202 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 15 00:46:26.834212 kernel: Booting paravirtualized kernel on KVM May 15 00:46:26.834227 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 00:46:26.834238 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 15 00:46:26.834260 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 15 00:46:26.834270 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 15 00:46:26.834279 kernel: pcpu-alloc: [0] 0 1 2 3 May 15 00:46:26.834296 kernel: kvm-guest: setup async PF for cpu 0 May 15 00:46:26.834310 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 15 00:46:26.834319 kernel: kvm-guest: PV spinlocks enabled May 15 00:46:26.834329 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 15 00:46:26.834349 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 15 00:46:26.834362 kernel: Policy zone: DMA32 May 15 00:46:26.834373 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:46:26.834383 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 00:46:26.834404 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 00:46:26.834416 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 00:46:26.834425 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 00:46:26.834436 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 169308K reserved, 0K cma-reserved) May 15 00:46:26.834446 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 00:46:26.834456 kernel: ftrace: allocating 34584 entries in 136 pages May 15 00:46:26.834466 kernel: ftrace: allocated 136 pages with 2 groups May 15 00:46:26.834475 kernel: rcu: Hierarchical RCU implementation. May 15 00:46:26.834486 kernel: rcu: RCU event tracing is enabled. May 15 00:46:26.834496 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 00:46:26.834507 kernel: Rude variant of Tasks RCU enabled. May 15 00:46:26.834517 kernel: Tracing variant of Tasks RCU enabled. May 15 00:46:26.834527 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 00:46:26.834546 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 00:46:26.834556 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 15 00:46:26.834565 kernel: Console: colour dummy device 80x25 May 15 00:46:26.834575 kernel: printk: console [ttyS0] enabled May 15 00:46:26.834585 kernel: ACPI: Core revision 20210730 May 15 00:46:26.834595 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 15 00:46:26.834606 kernel: APIC: Switch to symmetric I/O mode setup May 15 00:46:26.834616 kernel: x2apic enabled May 15 00:46:26.834626 kernel: Switched APIC routing to physical x2apic. May 15 00:46:26.834635 kernel: kvm-guest: setup PV IPIs May 15 00:46:26.834645 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 00:46:26.834655 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 00:46:26.834665 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794746) May 15 00:46:26.834675 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 15 00:46:26.834684 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 15 00:46:26.834696 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 15 00:46:26.834706 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 00:46:26.834715 kernel: Spectre V2 : Mitigation: Retpolines May 15 00:46:26.834725 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 00:46:26.834735 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 15 00:46:26.834745 kernel: RETBleed: Mitigation: untrained return thunk May 15 00:46:26.834755 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 00:46:26.834765 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 00:46:26.834775 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 00:46:26.834786 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 00:46:26.834796 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 00:46:26.834806 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 00:46:26.834816 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 15 00:46:26.834825 kernel: Freeing SMP alternatives memory: 32K May 15 00:46:26.834835 kernel: pid_max: default: 32768 minimum: 301 May 15 00:46:26.834844 kernel: LSM: Security Framework initializing May 15 00:46:26.834865 kernel: SELinux: Initializing. May 15 00:46:26.834892 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 00:46:26.834904 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 00:46:26.834914 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 15 00:46:26.834923 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 15 00:46:26.834933 kernel: ... version: 0 May 15 00:46:26.834943 kernel: ... bit width: 48 May 15 00:46:26.834953 kernel: ... generic registers: 6 May 15 00:46:26.834963 kernel: ... value mask: 0000ffffffffffff May 15 00:46:26.834972 kernel: ... max period: 00007fffffffffff May 15 00:46:26.834982 kernel: ... fixed-purpose events: 0 May 15 00:46:26.834993 kernel: ... event mask: 000000000000003f May 15 00:46:26.835002 kernel: signal: max sigframe size: 1776 May 15 00:46:26.835012 kernel: rcu: Hierarchical SRCU implementation. May 15 00:46:26.835022 kernel: smp: Bringing up secondary CPUs ... May 15 00:46:26.835032 kernel: x86: Booting SMP configuration: May 15 00:46:26.835041 kernel: .... node #0, CPUs: #1 May 15 00:46:26.835051 kernel: kvm-clock: cpu 1, msr 5e196041, secondary cpu clock May 15 00:46:26.835061 kernel: kvm-guest: setup async PF for cpu 1 May 15 00:46:26.835070 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 15 00:46:26.835081 kernel: #2 May 15 00:46:26.835091 kernel: kvm-clock: cpu 2, msr 5e196081, secondary cpu clock May 15 00:46:26.835101 kernel: kvm-guest: setup async PF for cpu 2 May 15 00:46:26.835111 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 15 00:46:26.835120 kernel: #3 May 15 00:46:26.835130 kernel: kvm-clock: cpu 3, msr 5e1960c1, secondary cpu clock May 15 00:46:26.835140 kernel: kvm-guest: setup async PF for cpu 3 May 15 00:46:26.835149 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 15 00:46:26.835159 kernel: smp: Brought up 1 node, 4 CPUs May 15 00:46:26.835169 kernel: smpboot: Max logical packages: 1 May 15 00:46:26.835180 kernel: smpboot: Total of 4 processors activated (22357.96 BogoMIPS) May 15 00:46:26.835190 kernel: devtmpfs: initialized May 15 00:46:26.835200 kernel: x86/mm: Memory block size: 128MB May 15 00:46:26.835209 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 15 00:46:26.835219 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 15 00:46:26.835229 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 15 00:46:26.835238 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 15 00:46:26.835247 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 15 00:46:26.835257 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 00:46:26.835268 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 00:46:26.835277 kernel: pinctrl core: initialized pinctrl subsystem May 15 00:46:26.835286 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 00:46:26.835296 kernel: audit: initializing netlink subsys (disabled) May 15 00:46:26.835306 kernel: audit: type=2000 audit(1747269986.826:1): state=initialized audit_enabled=0 res=1 May 15 00:46:26.835316 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 00:46:26.835326 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 00:46:26.835335 kernel: cpuidle: using governor menu May 15 00:46:26.835347 kernel: ACPI: bus type PCI registered May 15 00:46:26.835357 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 00:46:26.835367 kernel: dca service started, version 1.12.1 May 15 00:46:26.835377 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 15 00:46:26.835387 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 15 00:46:26.835397 kernel: PCI: Using configuration type 1 for base access May 15 00:46:26.835407 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 00:46:26.835417 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 00:46:26.835427 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 00:46:26.835438 kernel: ACPI: Added _OSI(Module Device) May 15 00:46:26.835448 kernel: ACPI: Added _OSI(Processor Device) May 15 00:46:26.835458 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 00:46:26.835468 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 00:46:26.835477 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 00:46:26.835487 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 00:46:26.835497 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 00:46:26.835507 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 00:46:26.835516 kernel: ACPI: Interpreter enabled May 15 00:46:26.835526 kernel: ACPI: PM: (supports S0 S3 S5) May 15 00:46:26.835546 kernel: ACPI: Using IOAPIC for interrupt routing May 15 00:46:26.835556 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 00:46:26.835566 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 15 00:46:26.835575 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 00:46:26.835723 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 00:46:26.835818 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 15 00:46:26.835924 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 15 00:46:26.835940 kernel: PCI host bridge to bus 0000:00 May 15 00:46:26.836033 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 00:46:26.836115 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 00:46:26.836194 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 00:46:26.836273 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 15 00:46:26.836377 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 00:46:26.836458 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 15 00:46:26.836552 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 00:46:26.836694 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 15 00:46:26.836782 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 15 00:46:26.836865 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 15 00:46:26.836946 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 15 00:46:26.837015 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 15 00:46:26.837086 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 15 00:46:26.837152 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 00:46:26.837233 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 15 00:46:26.837306 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 15 00:46:26.837375 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 15 00:46:26.837443 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 15 00:46:26.837546 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 15 00:46:26.837623 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 15 00:46:26.837690 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 15 00:46:26.837758 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 15 00:46:26.837836 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 15 00:46:26.837927 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 15 00:46:26.837997 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 15 00:46:26.838065 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 15 00:46:26.838138 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 15 00:46:26.838212 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 15 00:46:26.838281 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 15 00:46:26.838354 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 15 00:46:26.838423 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 15 00:46:26.838490 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 15 00:46:26.838578 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 15 00:46:26.838651 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 15 00:46:26.838660 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 00:46:26.838667 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 00:46:26.838674 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 00:46:26.838681 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 00:46:26.838688 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 15 00:46:26.838695 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 15 00:46:26.838702 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 15 00:46:26.838713 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 15 00:46:26.838720 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 15 00:46:26.838728 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 15 00:46:26.838736 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 15 00:46:26.838742 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 15 00:46:26.838749 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 15 00:46:26.838756 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 15 00:46:26.838763 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 15 00:46:26.838769 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 15 00:46:26.838777 kernel: iommu: Default domain type: Translated May 15 00:46:26.838784 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 00:46:26.838884 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 15 00:46:26.838955 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 00:46:26.839021 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 15 00:46:26.839030 kernel: vgaarb: loaded May 15 00:46:26.839037 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 00:46:26.839045 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 00:46:26.839054 kernel: PTP clock support registered May 15 00:46:26.839061 kernel: Registered efivars operations May 15 00:46:26.839067 kernel: PCI: Using ACPI for IRQ routing May 15 00:46:26.839074 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 00:46:26.839081 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 15 00:46:26.839088 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 15 00:46:26.839094 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 15 00:46:26.839101 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 15 00:46:26.839107 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 15 00:46:26.839114 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 15 00:46:26.839122 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 15 00:46:26.839129 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 15 00:46:26.839136 kernel: clocksource: Switched to clocksource kvm-clock May 15 00:46:26.839143 kernel: VFS: Disk quotas dquot_6.6.0 May 15 00:46:26.839150 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 00:46:26.839156 kernel: pnp: PnP ACPI init May 15 00:46:26.839228 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 15 00:46:26.839240 kernel: pnp: PnP ACPI: found 6 devices May 15 00:46:26.839247 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 00:46:26.839254 kernel: NET: Registered PF_INET protocol family May 15 00:46:26.839261 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 00:46:26.839268 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 00:46:26.839275 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 00:46:26.839282 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 00:46:26.839289 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 00:46:26.839296 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 00:46:26.839304 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 00:46:26.839310 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 00:46:26.839317 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 00:46:26.839324 kernel: NET: Registered PF_XDP protocol family May 15 00:46:26.839392 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 15 00:46:26.839460 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 15 00:46:26.839521 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 00:46:26.839593 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 00:46:26.839657 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 00:46:26.839718 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 15 00:46:26.839782 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 15 00:46:26.839843 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 15 00:46:26.839864 kernel: PCI: CLS 0 bytes, default 64 May 15 00:46:26.839871 kernel: Initialise system trusted keyrings May 15 00:46:26.839878 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 00:46:26.839884 kernel: Key type asymmetric registered May 15 00:46:26.839891 kernel: Asymmetric key parser 'x509' registered May 15 00:46:26.839901 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 00:46:26.839908 kernel: io scheduler mq-deadline registered May 15 00:46:26.839923 kernel: io scheduler kyber registered May 15 00:46:26.839931 kernel: io scheduler bfq registered May 15 00:46:26.839938 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 00:46:26.839946 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 15 00:46:26.839953 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 15 00:46:26.839960 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 15 00:46:26.839968 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 00:46:26.839976 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 00:46:26.839983 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 00:46:26.839990 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 00:46:26.839997 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 00:46:26.840075 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 00:46:26.840086 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 00:46:26.840148 kernel: rtc_cmos 00:04: registered as rtc0 May 15 00:46:26.840212 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T00:46:26 UTC (1747269986) May 15 00:46:26.840277 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 15 00:46:26.840287 kernel: efifb: probing for efifb May 15 00:46:26.840294 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 15 00:46:26.840302 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 15 00:46:26.840309 kernel: efifb: scrolling: redraw May 15 00:46:26.840316 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 15 00:46:26.840323 kernel: Console: switching to colour frame buffer device 160x50 May 15 00:46:26.840330 kernel: fb0: EFI VGA frame buffer device May 15 00:46:26.840338 kernel: pstore: Registered efi as persistent store backend May 15 00:46:26.840347 kernel: NET: Registered PF_INET6 protocol family May 15 00:46:26.840355 kernel: Segment Routing with IPv6 May 15 00:46:26.840362 kernel: In-situ OAM (IOAM) with IPv6 May 15 00:46:26.840370 kernel: NET: Registered PF_PACKET protocol family May 15 00:46:26.840378 kernel: Key type dns_resolver registered May 15 00:46:26.840386 kernel: IPI shorthand broadcast: enabled May 15 00:46:26.840393 kernel: sched_clock: Marking stable (415313311, 128946835)->(588654929, -44394783) May 15 00:46:26.840400 kernel: registered taskstats version 1 May 15 00:46:26.840407 kernel: Loading compiled-in X.509 certificates May 15 00:46:26.840415 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: a3400373b5c34ccb74f940604f224840f2b40bdd' May 15 00:46:26.840422 kernel: Key type .fscrypt registered May 15 00:46:26.840429 kernel: Key type fscrypt-provisioning registered May 15 00:46:26.840436 kernel: pstore: Using crash dump compression: deflate May 15 00:46:26.840443 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 00:46:26.840452 kernel: ima: Allocated hash algorithm: sha1 May 15 00:46:26.840459 kernel: ima: No architecture policies found May 15 00:46:26.840466 kernel: clk: Disabling unused clocks May 15 00:46:26.840473 kernel: Freeing unused kernel image (initmem) memory: 47456K May 15 00:46:26.840480 kernel: Write protecting the kernel read-only data: 28672k May 15 00:46:26.840488 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 00:46:26.840495 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 00:46:26.840502 kernel: Run /init as init process May 15 00:46:26.840510 kernel: with arguments: May 15 00:46:26.840518 kernel: /init May 15 00:46:26.840525 kernel: with environment: May 15 00:46:26.840532 kernel: HOME=/ May 15 00:46:26.840546 kernel: TERM=linux May 15 00:46:26.840553 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 00:46:26.840563 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 00:46:26.840572 systemd[1]: Detected virtualization kvm. May 15 00:46:26.840580 systemd[1]: Detected architecture x86-64. May 15 00:46:26.840589 systemd[1]: Running in initrd. May 15 00:46:26.840596 systemd[1]: No hostname configured, using default hostname. May 15 00:46:26.840604 systemd[1]: Hostname set to . May 15 00:46:26.840611 systemd[1]: Initializing machine ID from VM UUID. May 15 00:46:26.840619 systemd[1]: Queued start job for default target initrd.target. May 15 00:46:26.840626 systemd[1]: Started systemd-ask-password-console.path. May 15 00:46:26.840634 systemd[1]: Reached target cryptsetup.target. May 15 00:46:26.840641 systemd[1]: Reached target paths.target. May 15 00:46:26.840650 systemd[1]: Reached target slices.target. May 15 00:46:26.840657 systemd[1]: Reached target swap.target. May 15 00:46:26.840664 systemd[1]: Reached target timers.target. May 15 00:46:26.840672 systemd[1]: Listening on iscsid.socket. May 15 00:46:26.840680 systemd[1]: Listening on iscsiuio.socket. May 15 00:46:26.840688 systemd[1]: Listening on systemd-journald-audit.socket. May 15 00:46:26.840695 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 00:46:26.840704 systemd[1]: Listening on systemd-journald.socket. May 15 00:46:26.840714 systemd[1]: Listening on systemd-networkd.socket. May 15 00:46:26.840723 systemd[1]: Listening on systemd-udevd-control.socket. May 15 00:46:26.840732 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 00:46:26.840739 systemd[1]: Reached target sockets.target. May 15 00:46:26.840747 systemd[1]: Starting kmod-static-nodes.service... May 15 00:46:26.840754 systemd[1]: Finished network-cleanup.service. May 15 00:46:26.840762 systemd[1]: Starting systemd-fsck-usr.service... May 15 00:46:26.840769 systemd[1]: Starting systemd-journald.service... May 15 00:46:26.840777 systemd[1]: Starting systemd-modules-load.service... May 15 00:46:26.840786 systemd[1]: Starting systemd-resolved.service... May 15 00:46:26.840793 systemd[1]: Starting systemd-vconsole-setup.service... May 15 00:46:26.840801 systemd[1]: Finished kmod-static-nodes.service. May 15 00:46:26.840808 systemd[1]: Finished systemd-fsck-usr.service. May 15 00:46:26.840816 systemd[1]: Finished systemd-vconsole-setup.service. May 15 00:46:26.840824 systemd[1]: Starting dracut-cmdline-ask.service... May 15 00:46:26.840834 systemd-journald[197]: Journal started May 15 00:46:26.840883 systemd-journald[197]: Runtime Journal (/run/log/journal/66d4e9c09fae4a44b9e1dd5663ada740) is 6.0M, max 48.4M, 42.4M free. May 15 00:46:26.830163 systemd-modules-load[198]: Inserted module 'overlay' May 15 00:46:26.841447 systemd-resolved[199]: Positive Trust Anchors: May 15 00:46:26.857817 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 00:46:26.857841 systemd[1]: Started systemd-journald.service. May 15 00:46:26.857861 kernel: audit: type=1130 audit(1747269986.845:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.857872 kernel: audit: type=1130 audit(1747269986.849:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.857884 kernel: audit: type=1130 audit(1747269986.850:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.841455 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 00:46:26.863822 kernel: audit: type=1130 audit(1747269986.857:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.841481 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 00:46:26.871103 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 00:46:26.847467 systemd-resolved[199]: Defaulting to hostname 'linux'. May 15 00:46:26.848368 systemd[1]: Started systemd-resolved.service. May 15 00:46:26.850959 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 00:46:26.851134 systemd[1]: Reached target nss-lookup.target. May 15 00:46:26.857960 systemd[1]: Finished dracut-cmdline-ask.service. May 15 00:46:26.859582 systemd[1]: Starting dracut-cmdline.service... May 15 00:46:26.877241 systemd-modules-load[198]: Inserted module 'br_netfilter' May 15 00:46:26.878161 kernel: Bridge firewalling registered May 15 00:46:26.881238 dracut-cmdline[214]: dracut-dracut-053 May 15 00:46:26.883395 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 00:46:26.894865 kernel: SCSI subsystem initialized May 15 00:46:26.906034 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 00:46:26.906061 kernel: device-mapper: uevent: version 1.0.3 May 15 00:46:26.907286 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 00:46:26.909948 systemd-modules-load[198]: Inserted module 'dm_multipath' May 15 00:46:26.910680 systemd[1]: Finished systemd-modules-load.service. May 15 00:46:26.916984 kernel: audit: type=1130 audit(1747269986.911:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.912662 systemd[1]: Starting systemd-sysctl.service... May 15 00:46:26.919811 systemd[1]: Finished systemd-sysctl.service. May 15 00:46:26.924174 kernel: audit: type=1130 audit(1747269986.919:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:26.937871 kernel: Loading iSCSI transport class v2.0-870. May 15 00:46:26.953877 kernel: iscsi: registered transport (tcp) May 15 00:46:26.975189 kernel: iscsi: registered transport (qla4xxx) May 15 00:46:26.975218 kernel: QLogic iSCSI HBA Driver May 15 00:46:27.002721 systemd[1]: Finished dracut-cmdline.service. May 15 00:46:27.008306 kernel: audit: type=1130 audit(1747269987.002:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:27.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:27.004563 systemd[1]: Starting dracut-pre-udev.service... May 15 00:46:27.049881 kernel: raid6: avx2x4 gen() 29975 MB/s May 15 00:46:27.066865 kernel: raid6: avx2x4 xor() 7408 MB/s May 15 00:46:27.083862 kernel: raid6: avx2x2 gen() 32293 MB/s May 15 00:46:27.100864 kernel: raid6: avx2x2 xor() 19278 MB/s May 15 00:46:27.117863 kernel: raid6: avx2x1 gen() 26573 MB/s May 15 00:46:27.134863 kernel: raid6: avx2x1 xor() 15364 MB/s May 15 00:46:27.151864 kernel: raid6: sse2x4 gen() 14834 MB/s May 15 00:46:27.168862 kernel: raid6: sse2x4 xor() 7175 MB/s May 15 00:46:27.185863 kernel: raid6: sse2x2 gen() 16215 MB/s May 15 00:46:27.202866 kernel: raid6: sse2x2 xor() 9841 MB/s May 15 00:46:27.219866 kernel: raid6: sse2x1 gen() 12278 MB/s May 15 00:46:27.237248 kernel: raid6: sse2x1 xor() 7819 MB/s May 15 00:46:27.237263 kernel: raid6: using algorithm avx2x2 gen() 32293 MB/s May 15 00:46:27.237272 kernel: raid6: .... xor() 19278 MB/s, rmw enabled May 15 00:46:27.238870 kernel: raid6: using avx2x2 recovery algorithm May 15 00:46:27.249867 kernel: xor: automatically using best checksumming function avx May 15 00:46:27.336873 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 00:46:27.344974 systemd[1]: Finished dracut-pre-udev.service. May 15 00:46:27.350613 kernel: audit: type=1130 audit(1747269987.345:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:27.350633 kernel: audit: type=1334 audit(1747269987.348:10): prog-id=7 op=LOAD May 15 00:46:27.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:27.348000 audit: BPF prog-id=7 op=LOAD May 15 00:46:27.349000 audit: BPF prog-id=8 op=LOAD May 15 00:46:27.350934 systemd[1]: Starting systemd-udevd.service... May 15 00:46:27.362153 systemd-udevd[398]: Using default interface naming scheme 'v252'. May 15 00:46:27.365776 systemd[1]: Started systemd-udevd.service. May 15 00:46:27.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:27.368861 systemd[1]: Starting dracut-pre-trigger.service... May 15 00:46:27.378237 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation May 15 00:46:27.401244 systemd[1]: Finished dracut-pre-trigger.service. May 15 00:46:27.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:27.402395 systemd[1]: Starting systemd-udev-trigger.service... May 15 00:46:27.433244 systemd[1]: Finished systemd-udev-trigger.service. May 15 00:46:27.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:27.463211 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 00:46:27.470002 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 00:46:27.470017 kernel: GPT:9289727 != 19775487 May 15 00:46:27.470032 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 00:46:27.470043 kernel: GPT:9289727 != 19775487 May 15 00:46:27.470053 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 00:46:27.470064 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:46:27.476112 kernel: cryptd: max_cpu_qlen set to 1000 May 15 00:46:27.483865 kernel: libata version 3.00 loaded. May 15 00:46:27.487869 kernel: AVX2 version of gcm_enc/dec engaged. May 15 00:46:27.487890 kernel: AES CTR mode by8 optimization enabled May 15 00:46:27.493877 kernel: ahci 0000:00:1f.2: version 3.0 May 15 00:46:27.519325 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 15 00:46:27.519341 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 15 00:46:27.519433 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 15 00:46:27.519507 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (443) May 15 00:46:27.519518 kernel: scsi host0: ahci May 15 00:46:27.519618 kernel: scsi host1: ahci May 15 00:46:27.519697 kernel: scsi host2: ahci May 15 00:46:27.519777 kernel: scsi host3: ahci May 15 00:46:27.519874 kernel: scsi host4: ahci May 15 00:46:27.519955 kernel: scsi host5: ahci May 15 00:46:27.520049 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 15 00:46:27.520058 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 15 00:46:27.520067 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 15 00:46:27.520076 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 15 00:46:27.520087 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 15 00:46:27.520095 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 15 00:46:27.504897 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 00:46:27.514724 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 00:46:27.522749 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 00:46:27.528679 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 00:46:27.529783 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 00:46:27.532814 systemd[1]: Starting disk-uuid.service... May 15 00:46:27.538860 disk-uuid[532]: Primary Header is updated. May 15 00:46:27.538860 disk-uuid[532]: Secondary Entries is updated. May 15 00:46:27.538860 disk-uuid[532]: Secondary Header is updated. May 15 00:46:27.542299 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:46:27.544866 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:46:27.547875 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:46:27.822887 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 15 00:46:27.822937 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 15 00:46:27.830878 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 15 00:46:27.830963 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 15 00:46:27.831873 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 15 00:46:27.832875 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 15 00:46:27.833930 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 15 00:46:27.833940 kernel: ata3.00: applying bridge limits May 15 00:46:27.835242 kernel: ata3.00: configured for UDMA/100 May 15 00:46:27.835877 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 15 00:46:27.864877 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 15 00:46:27.881433 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 00:46:27.881452 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 00:46:28.545692 disk-uuid[533]: The operation has completed successfully. May 15 00:46:28.546974 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 00:46:28.567300 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 00:46:28.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.567383 systemd[1]: Finished disk-uuid.service. May 15 00:46:28.575889 systemd[1]: Starting verity-setup.service... May 15 00:46:28.588865 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 15 00:46:28.606144 systemd[1]: Found device dev-mapper-usr.device. May 15 00:46:28.608788 systemd[1]: Mounting sysusr-usr.mount... May 15 00:46:28.610551 systemd[1]: Finished verity-setup.service. May 15 00:46:28.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.672870 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 00:46:28.672903 systemd[1]: Mounted sysusr-usr.mount. May 15 00:46:28.673354 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 00:46:28.673880 systemd[1]: Starting ignition-setup.service... May 15 00:46:28.675073 systemd[1]: Starting parse-ip-for-networkd.service... May 15 00:46:28.683401 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 00:46:28.683429 kernel: BTRFS info (device vda6): using free space tree May 15 00:46:28.683438 kernel: BTRFS info (device vda6): has skinny extents May 15 00:46:28.690757 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 00:46:28.698395 systemd[1]: Finished ignition-setup.service. May 15 00:46:28.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.700512 systemd[1]: Starting ignition-fetch-offline.service... May 15 00:46:28.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.735000 audit: BPF prog-id=9 op=LOAD May 15 00:46:28.734974 ignition[650]: Ignition 2.14.0 May 15 00:46:28.734764 systemd[1]: Finished parse-ip-for-networkd.service. May 15 00:46:28.734980 ignition[650]: Stage: fetch-offline May 15 00:46:28.737081 systemd[1]: Starting systemd-networkd.service... May 15 00:46:28.735027 ignition[650]: no configs at "/usr/lib/ignition/base.d" May 15 00:46:28.735035 ignition[650]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:46:28.735136 ignition[650]: parsed url from cmdline: "" May 15 00:46:28.735139 ignition[650]: no config URL provided May 15 00:46:28.735143 ignition[650]: reading system config file "/usr/lib/ignition/user.ign" May 15 00:46:28.735149 ignition[650]: no config at "/usr/lib/ignition/user.ign" May 15 00:46:28.735165 ignition[650]: op(1): [started] loading QEMU firmware config module May 15 00:46:28.735169 ignition[650]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 00:46:28.738548 ignition[650]: op(1): [finished] loading QEMU firmware config module May 15 00:46:28.774216 systemd-networkd[724]: lo: Link UP May 15 00:46:28.774223 systemd-networkd[724]: lo: Gained carrier May 15 00:46:28.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.774596 systemd-networkd[724]: Enumeration completed May 15 00:46:28.774651 systemd[1]: Started systemd-networkd.service. May 15 00:46:28.775658 systemd-networkd[724]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 00:46:28.776074 systemd[1]: Reached target network.target. May 15 00:46:28.778427 systemd[1]: Starting iscsiuio.service... May 15 00:46:28.779242 systemd-networkd[724]: eth0: Link UP May 15 00:46:28.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.779245 systemd-networkd[724]: eth0: Gained carrier May 15 00:46:28.783302 systemd[1]: Started iscsiuio.service. May 15 00:46:28.785565 systemd[1]: Starting iscsid.service... May 15 00:46:28.788888 iscsid[729]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 00:46:28.788888 iscsid[729]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 00:46:28.788888 iscsid[729]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 00:46:28.788888 iscsid[729]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 00:46:28.788888 iscsid[729]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 00:46:28.788888 iscsid[729]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 00:46:28.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.789229 systemd[1]: Started iscsid.service. May 15 00:46:28.791856 systemd[1]: Starting dracut-initqueue.service... May 15 00:46:28.802669 systemd[1]: Finished dracut-initqueue.service. May 15 00:46:28.803676 systemd[1]: Reached target remote-fs-pre.target. May 15 00:46:28.805999 systemd[1]: Reached target remote-cryptsetup.target. May 15 00:46:28.806997 systemd[1]: Reached target remote-fs.target. May 15 00:46:28.808404 systemd[1]: Starting dracut-pre-mount.service... May 15 00:46:28.814910 systemd[1]: Finished dracut-pre-mount.service. May 15 00:46:28.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.819504 ignition[650]: parsing config with SHA512: 1e6a09c214179ee51338e1e609e8f89b6b9d41564ff759b025492c2c367f71f64fcd6ce24cfd6c0d1f5c1643bf4cf78698fe02722818e316b66aa06ba90b4142 May 15 00:46:28.824983 unknown[650]: fetched base config from "system" May 15 00:46:28.825000 unknown[650]: fetched user config from "qemu" May 15 00:46:28.826944 ignition[650]: fetch-offline: fetch-offline passed May 15 00:46:28.827844 ignition[650]: Ignition finished successfully May 15 00:46:28.829623 systemd[1]: Finished ignition-fetch-offline.service. May 15 00:46:28.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.830259 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 00:46:28.831276 systemd[1]: Starting ignition-kargs.service... May 15 00:46:28.835928 systemd-networkd[724]: eth0: DHCPv4 address 10.0.0.19/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 00:46:28.842417 ignition[743]: Ignition 2.14.0 May 15 00:46:28.842426 ignition[743]: Stage: kargs May 15 00:46:28.842514 ignition[743]: no configs at "/usr/lib/ignition/base.d" May 15 00:46:28.842524 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:46:28.846298 ignition[743]: kargs: kargs passed May 15 00:46:28.846336 ignition[743]: Ignition finished successfully May 15 00:46:28.848386 systemd[1]: Finished ignition-kargs.service. May 15 00:46:28.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.849832 systemd[1]: Starting ignition-disks.service... May 15 00:46:28.855660 ignition[749]: Ignition 2.14.0 May 15 00:46:28.855668 ignition[749]: Stage: disks May 15 00:46:28.855752 ignition[749]: no configs at "/usr/lib/ignition/base.d" May 15 00:46:28.857138 systemd[1]: Finished ignition-disks.service. May 15 00:46:28.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.855761 ignition[749]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:46:28.858729 systemd[1]: Reached target initrd-root-device.target. May 15 00:46:28.856617 ignition[749]: disks: disks passed May 15 00:46:28.860244 systemd[1]: Reached target local-fs-pre.target. May 15 00:46:28.856646 ignition[749]: Ignition finished successfully May 15 00:46:28.861044 systemd[1]: Reached target local-fs.target. May 15 00:46:28.861795 systemd[1]: Reached target sysinit.target. May 15 00:46:28.863519 systemd[1]: Reached target basic.target. May 15 00:46:28.864819 systemd[1]: Starting systemd-fsck-root.service... May 15 00:46:28.874670 systemd-fsck[757]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 15 00:46:28.879647 systemd[1]: Finished systemd-fsck-root.service. May 15 00:46:28.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.882208 systemd[1]: Mounting sysroot.mount... May 15 00:46:28.888550 systemd[1]: Mounted sysroot.mount. May 15 00:46:28.889878 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 00:46:28.889907 systemd[1]: Reached target initrd-root-fs.target. May 15 00:46:28.892205 systemd[1]: Mounting sysroot-usr.mount... May 15 00:46:28.893762 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 00:46:28.893794 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 00:46:28.895110 systemd[1]: Reached target ignition-diskful.target. May 15 00:46:28.898926 systemd[1]: Mounted sysroot-usr.mount. May 15 00:46:28.900822 systemd[1]: Starting initrd-setup-root.service... May 15 00:46:28.904449 initrd-setup-root[767]: cut: /sysroot/etc/passwd: No such file or directory May 15 00:46:28.908307 initrd-setup-root[775]: cut: /sysroot/etc/group: No such file or directory May 15 00:46:28.911818 initrd-setup-root[783]: cut: /sysroot/etc/shadow: No such file or directory May 15 00:46:28.915254 initrd-setup-root[791]: cut: /sysroot/etc/gshadow: No such file or directory May 15 00:46:28.927390 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.19 May 15 00:46:28.927401 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux3'. May 15 00:46:28.940505 systemd[1]: Finished initrd-setup-root.service. May 15 00:46:28.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.942045 systemd[1]: Starting ignition-mount.service... May 15 00:46:28.942932 systemd[1]: Starting sysroot-boot.service... May 15 00:46:28.948987 bash[809]: umount: /sysroot/usr/share/oem: not mounted. May 15 00:46:28.956809 ignition[810]: INFO : Ignition 2.14.0 May 15 00:46:28.956809 ignition[810]: INFO : Stage: mount May 15 00:46:28.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.957359 systemd[1]: Finished sysroot-boot.service. May 15 00:46:28.960750 ignition[810]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:46:28.960750 ignition[810]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:46:28.960750 ignition[810]: INFO : mount: mount passed May 15 00:46:28.960750 ignition[810]: INFO : Ignition finished successfully May 15 00:46:28.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:28.959633 systemd[1]: Finished ignition-mount.service. May 15 00:46:29.617236 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 00:46:29.623456 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (818) May 15 00:46:29.623489 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 00:46:29.623499 kernel: BTRFS info (device vda6): using free space tree May 15 00:46:29.624268 kernel: BTRFS info (device vda6): has skinny extents May 15 00:46:29.628129 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 00:46:29.629980 systemd[1]: Starting ignition-files.service... May 15 00:46:29.641721 ignition[838]: INFO : Ignition 2.14.0 May 15 00:46:29.641721 ignition[838]: INFO : Stage: files May 15 00:46:29.643337 ignition[838]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:46:29.643337 ignition[838]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:46:29.646364 ignition[838]: DEBUG : files: compiled without relabeling support, skipping May 15 00:46:29.647803 ignition[838]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 00:46:29.647803 ignition[838]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 00:46:29.651500 ignition[838]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 00:46:29.653063 ignition[838]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 00:46:29.653063 ignition[838]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 00:46:29.653063 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 00:46:29.653063 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 15 00:46:29.652118 unknown[838]: wrote ssh authorized keys file for user: core May 15 00:46:29.721572 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 00:46:29.823797 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 00:46:29.823797 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 00:46:29.827583 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 00:46:29.827583 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 00:46:29.831258 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 00:46:29.831258 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 00:46:29.831258 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 00:46:29.831258 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 00:46:29.831258 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 00:46:29.831258 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 00:46:29.831258 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 00:46:29.831258 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 00:46:29.831258 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 00:46:29.831258 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 00:46:29.831258 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 15 00:46:30.287306 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 00:46:30.612602 systemd-networkd[724]: eth0: Gained IPv6LL May 15 00:46:30.727145 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 00:46:30.727145 ignition[838]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 15 00:46:30.731122 ignition[838]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 00:46:30.731122 ignition[838]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 00:46:30.731122 ignition[838]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 15 00:46:30.731122 ignition[838]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 00:46:30.731122 ignition[838]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 00:46:30.731122 ignition[838]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 00:46:30.731122 ignition[838]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 00:46:30.731122 ignition[838]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 15 00:46:30.731122 ignition[838]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 15 00:46:30.731122 ignition[838]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 00:46:30.731122 ignition[838]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 00:46:30.752179 ignition[838]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 00:46:30.753887 ignition[838]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 00:46:30.755305 ignition[838]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 00:46:30.757053 ignition[838]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 00:46:30.757053 ignition[838]: INFO : files: files passed May 15 00:46:30.759471 ignition[838]: INFO : Ignition finished successfully May 15 00:46:30.761211 systemd[1]: Finished ignition-files.service. May 15 00:46:30.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.762857 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 00:46:30.763275 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 00:46:30.763785 systemd[1]: Starting ignition-quench.service... May 15 00:46:30.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.766215 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 00:46:30.766280 systemd[1]: Finished ignition-quench.service. May 15 00:46:30.773904 initrd-setup-root-after-ignition[863]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 00:46:30.776681 initrd-setup-root-after-ignition[865]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 00:46:30.778698 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 00:46:30.779041 systemd[1]: Reached target ignition-complete.target. May 15 00:46:30.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.779969 systemd[1]: Starting initrd-parse-etc.service... May 15 00:46:30.791575 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 00:46:30.791652 systemd[1]: Finished initrd-parse-etc.service. May 15 00:46:30.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.792141 systemd[1]: Reached target initrd-fs.target. May 15 00:46:30.794246 systemd[1]: Reached target initrd.target. May 15 00:46:30.795891 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 00:46:30.796910 systemd[1]: Starting dracut-pre-pivot.service... May 15 00:46:30.808629 systemd[1]: Finished dracut-pre-pivot.service. May 15 00:46:30.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.810233 systemd[1]: Starting initrd-cleanup.service... May 15 00:46:30.819003 systemd[1]: Stopped target nss-lookup.target. May 15 00:46:30.819499 systemd[1]: Stopped target remote-cryptsetup.target. May 15 00:46:30.821157 systemd[1]: Stopped target timers.target. May 15 00:46:30.822570 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 00:46:30.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.822653 systemd[1]: Stopped dracut-pre-pivot.service. May 15 00:46:30.824009 systemd[1]: Stopped target initrd.target. May 15 00:46:30.825596 systemd[1]: Stopped target basic.target. May 15 00:46:30.827153 systemd[1]: Stopped target ignition-complete.target. May 15 00:46:30.828329 systemd[1]: Stopped target ignition-diskful.target. May 15 00:46:30.829790 systemd[1]: Stopped target initrd-root-device.target. May 15 00:46:30.831382 systemd[1]: Stopped target remote-fs.target. May 15 00:46:30.833115 systemd[1]: Stopped target remote-fs-pre.target. May 15 00:46:30.834502 systemd[1]: Stopped target sysinit.target. May 15 00:46:30.836120 systemd[1]: Stopped target local-fs.target. May 15 00:46:30.837426 systemd[1]: Stopped target local-fs-pre.target. May 15 00:46:30.838812 systemd[1]: Stopped target swap.target. May 15 00:46:30.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.840233 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 00:46:30.840329 systemd[1]: Stopped dracut-pre-mount.service. May 15 00:46:30.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.840684 systemd[1]: Stopped target cryptsetup.target. May 15 00:46:30.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.843130 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 00:46:30.843216 systemd[1]: Stopped dracut-initqueue.service. May 15 00:46:30.844651 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 00:46:30.844736 systemd[1]: Stopped ignition-fetch-offline.service. May 15 00:46:30.846295 systemd[1]: Stopped target paths.target. May 15 00:46:30.847546 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 00:46:30.851947 systemd[1]: Stopped systemd-ask-password-console.path. May 15 00:46:30.853855 systemd[1]: Stopped target slices.target. May 15 00:46:30.855341 systemd[1]: Stopped target sockets.target. May 15 00:46:30.855910 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 00:46:30.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.856000 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 00:46:30.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.856410 systemd[1]: ignition-files.service: Deactivated successfully. May 15 00:46:30.862303 iscsid[729]: iscsid shutting down. May 15 00:46:30.856496 systemd[1]: Stopped ignition-files.service. May 15 00:46:30.860468 systemd[1]: Stopping ignition-mount.service... May 15 00:46:30.862428 systemd[1]: Stopping iscsid.service... May 15 00:46:30.865569 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 00:46:30.866602 systemd[1]: Stopped kmod-static-nodes.service. May 15 00:46:30.868184 ignition[878]: INFO : Ignition 2.14.0 May 15 00:46:30.868184 ignition[878]: INFO : Stage: umount May 15 00:46:30.868184 ignition[878]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 00:46:30.868184 ignition[878]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 00:46:30.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.871770 ignition[878]: INFO : umount: umount passed May 15 00:46:30.871770 ignition[878]: INFO : Ignition finished successfully May 15 00:46:30.873833 systemd[1]: Stopping sysroot-boot.service... May 15 00:46:30.875273 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 00:46:30.876372 systemd[1]: Stopped systemd-udev-trigger.service. May 15 00:46:30.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.878138 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 00:46:30.879222 systemd[1]: Stopped dracut-pre-trigger.service. May 15 00:46:30.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.882657 systemd[1]: iscsid.service: Deactivated successfully. May 15 00:46:30.883654 systemd[1]: Stopped iscsid.service. May 15 00:46:30.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.885421 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 00:46:30.886397 systemd[1]: Stopped ignition-mount.service. May 15 00:46:30.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.889142 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 00:46:30.890579 systemd[1]: iscsid.socket: Deactivated successfully. May 15 00:46:30.891485 systemd[1]: Closed iscsid.socket. May 15 00:46:30.892832 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 00:46:30.892878 systemd[1]: Stopped ignition-disks.service. May 15 00:46:30.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.895312 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 00:46:30.895342 systemd[1]: Stopped ignition-kargs.service. May 15 00:46:30.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.897879 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 00:46:30.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.897911 systemd[1]: Stopped ignition-setup.service. May 15 00:46:30.900359 systemd[1]: Stopping iscsiuio.service... May 15 00:46:30.901882 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 00:46:30.902903 systemd[1]: Finished initrd-cleanup.service. May 15 00:46:30.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.904703 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 00:46:30.905699 systemd[1]: Stopped iscsiuio.service. May 15 00:46:30.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.907869 systemd[1]: Stopped target network.target. May 15 00:46:30.909366 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 00:46:30.909402 systemd[1]: Closed iscsiuio.socket. May 15 00:46:30.911685 systemd[1]: Stopping systemd-networkd.service... May 15 00:46:30.913362 systemd[1]: Stopping systemd-resolved.service... May 15 00:46:30.917897 systemd-networkd[724]: eth0: DHCPv6 lease lost May 15 00:46:30.918991 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 00:46:30.920059 systemd[1]: Stopped systemd-networkd.service. May 15 00:46:30.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.922294 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 00:46:30.923333 systemd[1]: Stopped systemd-resolved.service. May 15 00:46:30.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.925543 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 00:46:30.925574 systemd[1]: Closed systemd-networkd.socket. May 15 00:46:30.926000 audit: BPF prog-id=9 op=UNLOAD May 15 00:46:30.926000 audit: BPF prog-id=6 op=UNLOAD May 15 00:46:30.928733 systemd[1]: Stopping network-cleanup.service... May 15 00:46:30.930280 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 00:46:30.930322 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 00:46:30.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.933092 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 00:46:30.933125 systemd[1]: Stopped systemd-sysctl.service. May 15 00:46:30.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.935731 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 00:46:30.935765 systemd[1]: Stopped systemd-modules-load.service. May 15 00:46:30.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.938497 systemd[1]: Stopping systemd-udevd.service... May 15 00:46:30.940660 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 00:46:30.944664 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 00:46:30.944766 systemd[1]: Stopped network-cleanup.service. May 15 00:46:30.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.947568 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 00:46:30.947674 systemd[1]: Stopped systemd-udevd.service. May 15 00:46:30.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.949297 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 00:46:30.949326 systemd[1]: Closed systemd-udevd-control.socket. May 15 00:46:30.949754 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 00:46:30.949775 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 00:46:30.954259 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 00:46:30.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.954315 systemd[1]: Stopped dracut-pre-udev.service. May 15 00:46:30.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.955881 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 00:46:30.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.955927 systemd[1]: Stopped dracut-cmdline.service. May 15 00:46:30.956447 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 00:46:30.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.956475 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 00:46:30.959126 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 00:46:30.961353 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 00:46:30.961401 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 00:46:30.966826 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 00:46:30.967753 systemd[1]: Stopped sysroot-boot.service. May 15 00:46:30.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.969358 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 00:46:30.970471 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 00:46:30.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.972354 systemd[1]: Reached target initrd-switch-root.target. May 15 00:46:30.974088 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 00:46:30.974125 systemd[1]: Stopped initrd-setup-root.service. May 15 00:46:30.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:30.977142 systemd[1]: Starting initrd-switch-root.service... May 15 00:46:30.992600 systemd[1]: Switching root. May 15 00:46:31.013371 systemd-journald[197]: Journal stopped May 15 00:46:33.452382 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). May 15 00:46:33.452434 kernel: SELinux: Class mctp_socket not defined in policy. May 15 00:46:33.452465 kernel: SELinux: Class anon_inode not defined in policy. May 15 00:46:33.452477 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 00:46:33.452489 kernel: SELinux: policy capability network_peer_controls=1 May 15 00:46:33.452501 kernel: SELinux: policy capability open_perms=1 May 15 00:46:33.452518 kernel: SELinux: policy capability extended_socket_class=1 May 15 00:46:33.452529 kernel: SELinux: policy capability always_check_network=0 May 15 00:46:33.452538 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 00:46:33.452547 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 00:46:33.452558 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 00:46:33.452569 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 00:46:33.452579 systemd[1]: Successfully loaded SELinux policy in 38.682ms. May 15 00:46:33.452596 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.578ms. May 15 00:46:33.452608 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 00:46:33.452618 systemd[1]: Detected virtualization kvm. May 15 00:46:33.452629 systemd[1]: Detected architecture x86-64. May 15 00:46:33.452639 systemd[1]: Detected first boot. May 15 00:46:33.452652 systemd[1]: Initializing machine ID from VM UUID. May 15 00:46:33.452661 kernel: kauditd_printk_skb: 64 callbacks suppressed May 15 00:46:33.452671 kernel: audit: type=1400 audit(1747269991.242:75): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:46:33.452682 kernel: audit: type=1400 audit(1747269991.242:76): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:46:33.452692 kernel: audit: type=1334 audit(1747269991.246:77): prog-id=10 op=LOAD May 15 00:46:33.452701 kernel: audit: type=1334 audit(1747269991.246:78): prog-id=10 op=UNLOAD May 15 00:46:33.452710 kernel: audit: type=1334 audit(1747269991.250:79): prog-id=11 op=LOAD May 15 00:46:33.452719 kernel: audit: type=1334 audit(1747269991.250:80): prog-id=11 op=UNLOAD May 15 00:46:33.452730 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 00:46:33.452740 kernel: audit: type=1400 audit(1747269991.283:81): avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 00:46:33.452751 kernel: audit: type=1300 audit(1747269991.283:81): arch=c000003e syscall=188 success=yes exit=0 a0=c0001558a2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:33.452761 kernel: audit: type=1327 audit(1747269991.283:81): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 00:46:33.452770 kernel: audit: type=1400 audit(1747269991.285:82): avc: denied { associate } for pid=911 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 00:46:33.452780 systemd[1]: Populated /etc with preset unit settings. May 15 00:46:33.452792 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:46:33.452803 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:46:33.452815 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:46:33.452825 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 00:46:33.452836 systemd[1]: Stopped initrd-switch-root.service. May 15 00:46:33.452862 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 00:46:33.452877 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 00:46:33.452892 systemd[1]: Created slice system-addon\x2drun.slice. May 15 00:46:33.452902 systemd[1]: Created slice system-getty.slice. May 15 00:46:33.452914 systemd[1]: Created slice system-modprobe.slice. May 15 00:46:33.452925 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 00:46:33.452936 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 00:46:33.452946 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 00:46:33.452956 systemd[1]: Created slice user.slice. May 15 00:46:33.452966 systemd[1]: Started systemd-ask-password-console.path. May 15 00:46:33.452976 systemd[1]: Started systemd-ask-password-wall.path. May 15 00:46:33.452986 systemd[1]: Set up automount boot.automount. May 15 00:46:33.452996 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 00:46:33.453006 systemd[1]: Stopped target initrd-switch-root.target. May 15 00:46:33.453016 systemd[1]: Stopped target initrd-fs.target. May 15 00:46:33.453027 systemd[1]: Stopped target initrd-root-fs.target. May 15 00:46:33.453037 systemd[1]: Reached target integritysetup.target. May 15 00:46:33.453047 systemd[1]: Reached target remote-cryptsetup.target. May 15 00:46:33.453057 systemd[1]: Reached target remote-fs.target. May 15 00:46:33.453067 systemd[1]: Reached target slices.target. May 15 00:46:33.453077 systemd[1]: Reached target swap.target. May 15 00:46:33.453087 systemd[1]: Reached target torcx.target. May 15 00:46:33.453097 systemd[1]: Reached target veritysetup.target. May 15 00:46:33.453109 systemd[1]: Listening on systemd-coredump.socket. May 15 00:46:33.453119 systemd[1]: Listening on systemd-initctl.socket. May 15 00:46:33.453131 systemd[1]: Listening on systemd-networkd.socket. May 15 00:46:33.453141 systemd[1]: Listening on systemd-udevd-control.socket. May 15 00:46:33.453164 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 00:46:33.453175 systemd[1]: Listening on systemd-userdbd.socket. May 15 00:46:33.453185 systemd[1]: Mounting dev-hugepages.mount... May 15 00:46:33.453195 systemd[1]: Mounting dev-mqueue.mount... May 15 00:46:33.453205 systemd[1]: Mounting media.mount... May 15 00:46:33.453215 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:46:33.453225 systemd[1]: Mounting sys-kernel-debug.mount... May 15 00:46:33.453236 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 00:46:33.453246 systemd[1]: Mounting tmp.mount... May 15 00:46:33.453256 systemd[1]: Starting flatcar-tmpfiles.service... May 15 00:46:33.453267 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:46:33.453277 systemd[1]: Starting kmod-static-nodes.service... May 15 00:46:33.453287 systemd[1]: Starting modprobe@configfs.service... May 15 00:46:33.453297 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:46:33.453307 systemd[1]: Starting modprobe@drm.service... May 15 00:46:33.453316 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:46:33.453328 systemd[1]: Starting modprobe@fuse.service... May 15 00:46:33.453338 systemd[1]: Starting modprobe@loop.service... May 15 00:46:33.453348 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 00:46:33.453358 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 00:46:33.453368 systemd[1]: Stopped systemd-fsck-root.service. May 15 00:46:33.453388 kernel: loop: module loaded May 15 00:46:33.453397 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 00:46:33.453408 systemd[1]: Stopped systemd-fsck-usr.service. May 15 00:46:33.453417 kernel: fuse: init (API version 7.34) May 15 00:46:33.453429 systemd[1]: Stopped systemd-journald.service. May 15 00:46:33.453438 systemd[1]: Starting systemd-journald.service... May 15 00:46:33.453448 systemd[1]: Starting systemd-modules-load.service... May 15 00:46:33.453458 systemd[1]: Starting systemd-network-generator.service... May 15 00:46:33.453468 systemd[1]: Starting systemd-remount-fs.service... May 15 00:46:33.453477 systemd[1]: Starting systemd-udev-trigger.service... May 15 00:46:33.453487 systemd[1]: verity-setup.service: Deactivated successfully. May 15 00:46:33.453497 systemd[1]: Stopped verity-setup.service. May 15 00:46:33.453507 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:46:33.453521 systemd-journald[992]: Journal started May 15 00:46:33.453557 systemd-journald[992]: Runtime Journal (/run/log/journal/66d4e9c09fae4a44b9e1dd5663ada740) is 6.0M, max 48.4M, 42.4M free. May 15 00:46:31.070000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 00:46:31.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:46:31.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 00:46:31.246000 audit: BPF prog-id=10 op=LOAD May 15 00:46:31.246000 audit: BPF prog-id=10 op=UNLOAD May 15 00:46:31.250000 audit: BPF prog-id=11 op=LOAD May 15 00:46:31.250000 audit: BPF prog-id=11 op=UNLOAD May 15 00:46:31.283000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 00:46:31.283000 audit[911]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558a2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:31.283000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 00:46:31.285000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 00:46:31.285000 audit[911]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000024030 a2=1ed a3=0 items=2 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:31.285000 audit: CWD cwd="/" May 15 00:46:31.285000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:31.285000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:31.285000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 00:46:33.330000 audit: BPF prog-id=12 op=LOAD May 15 00:46:33.330000 audit: BPF prog-id=3 op=UNLOAD May 15 00:46:33.330000 audit: BPF prog-id=13 op=LOAD May 15 00:46:33.330000 audit: BPF prog-id=14 op=LOAD May 15 00:46:33.330000 audit: BPF prog-id=4 op=UNLOAD May 15 00:46:33.330000 audit: BPF prog-id=5 op=UNLOAD May 15 00:46:33.331000 audit: BPF prog-id=15 op=LOAD May 15 00:46:33.331000 audit: BPF prog-id=12 op=UNLOAD May 15 00:46:33.331000 audit: BPF prog-id=16 op=LOAD May 15 00:46:33.331000 audit: BPF prog-id=17 op=LOAD May 15 00:46:33.331000 audit: BPF prog-id=13 op=UNLOAD May 15 00:46:33.331000 audit: BPF prog-id=14 op=UNLOAD May 15 00:46:33.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.345000 audit: BPF prog-id=15 op=UNLOAD May 15 00:46:33.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.436000 audit: BPF prog-id=18 op=LOAD May 15 00:46:33.436000 audit: BPF prog-id=19 op=LOAD May 15 00:46:33.436000 audit: BPF prog-id=20 op=LOAD May 15 00:46:33.436000 audit: BPF prog-id=16 op=UNLOAD May 15 00:46:33.436000 audit: BPF prog-id=17 op=UNLOAD May 15 00:46:33.450000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 00:46:33.450000 audit[992]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffc15014150 a2=4000 a3=7ffc150141ec items=0 ppid=1 pid=992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:33.450000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 00:46:33.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.329839 systemd[1]: Queued start job for default target multi-user.target. May 15 00:46:31.283276 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:46:33.329861 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 00:46:31.283477 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 00:46:33.332682 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 00:46:31.283493 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 00:46:31.283519 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 00:46:31.283528 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 00:46:31.283553 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 00:46:31.283564 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 00:46:31.283737 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 00:46:31.283770 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 00:46:31.283781 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 00:46:31.284057 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 00:46:31.284088 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 00:46:31.284105 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 15 00:46:31.284119 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 00:46:31.284135 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 15 00:46:31.284146 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 00:46:33.084107 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:33Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:46:33.084355 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:33Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:46:33.084454 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:33Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:46:33.084598 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:33Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 00:46:33.084643 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:33Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 00:46:33.084692 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-05-15T00:46:33Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 00:46:33.457919 systemd[1]: Started systemd-journald.service. May 15 00:46:33.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.458462 systemd[1]: Mounted dev-hugepages.mount. May 15 00:46:33.459311 systemd[1]: Mounted dev-mqueue.mount. May 15 00:46:33.460127 systemd[1]: Mounted media.mount. May 15 00:46:33.460888 systemd[1]: Mounted sys-kernel-debug.mount. May 15 00:46:33.461741 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 00:46:33.462641 systemd[1]: Mounted tmp.mount. May 15 00:46:33.463568 systemd[1]: Finished flatcar-tmpfiles.service. May 15 00:46:33.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.464642 systemd[1]: Finished kmod-static-nodes.service. May 15 00:46:33.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.465704 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 00:46:33.465862 systemd[1]: Finished modprobe@configfs.service. May 15 00:46:33.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.466899 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:46:33.467037 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:46:33.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.468066 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 00:46:33.468224 systemd[1]: Finished modprobe@drm.service. May 15 00:46:33.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.469211 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:46:33.469352 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:46:33.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.470544 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 00:46:33.470680 systemd[1]: Finished modprobe@fuse.service. May 15 00:46:33.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.471671 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:46:33.471827 systemd[1]: Finished modprobe@loop.service. May 15 00:46:33.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.472958 systemd[1]: Finished systemd-modules-load.service. May 15 00:46:33.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.474127 systemd[1]: Finished systemd-network-generator.service. May 15 00:46:33.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.475328 systemd[1]: Finished systemd-remount-fs.service. May 15 00:46:33.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.476564 systemd[1]: Reached target network-pre.target. May 15 00:46:33.478343 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 00:46:33.480141 systemd[1]: Mounting sys-kernel-config.mount... May 15 00:46:33.480907 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 00:46:33.481964 systemd[1]: Starting systemd-hwdb-update.service... May 15 00:46:33.483681 systemd[1]: Starting systemd-journal-flush.service... May 15 00:46:33.491972 systemd-journald[992]: Time spent on flushing to /var/log/journal/66d4e9c09fae4a44b9e1dd5663ada740 is 13.411ms for 1157 entries. May 15 00:46:33.491972 systemd-journald[992]: System Journal (/var/log/journal/66d4e9c09fae4a44b9e1dd5663ada740) is 8.0M, max 195.6M, 187.6M free. May 15 00:46:33.524814 systemd-journald[992]: Received client request to flush runtime journal. May 15 00:46:33.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.484716 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:46:33.485389 systemd[1]: Starting systemd-random-seed.service... May 15 00:46:33.486368 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:46:33.487043 systemd[1]: Starting systemd-sysctl.service... May 15 00:46:33.489511 systemd[1]: Starting systemd-sysusers.service... May 15 00:46:33.526405 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 00:46:33.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.491925 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 00:46:33.494557 systemd[1]: Mounted sys-kernel-config.mount. May 15 00:46:33.495570 systemd[1]: Finished systemd-udev-trigger.service. May 15 00:46:33.496838 systemd[1]: Finished systemd-random-seed.service. May 15 00:46:33.498026 systemd[1]: Reached target first-boot-complete.target. May 15 00:46:33.500004 systemd[1]: Starting systemd-udev-settle.service... May 15 00:46:33.502522 systemd[1]: Finished systemd-sysctl.service. May 15 00:46:33.506822 systemd[1]: Finished systemd-sysusers.service. May 15 00:46:33.525536 systemd[1]: Finished systemd-journal-flush.service. May 15 00:46:33.882526 systemd[1]: Finished systemd-hwdb-update.service. May 15 00:46:33.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.883000 audit: BPF prog-id=21 op=LOAD May 15 00:46:33.883000 audit: BPF prog-id=22 op=LOAD May 15 00:46:33.883000 audit: BPF prog-id=7 op=UNLOAD May 15 00:46:33.883000 audit: BPF prog-id=8 op=UNLOAD May 15 00:46:33.884662 systemd[1]: Starting systemd-udevd.service... May 15 00:46:33.898992 systemd-udevd[1017]: Using default interface naming scheme 'v252'. May 15 00:46:33.910711 systemd[1]: Started systemd-udevd.service. May 15 00:46:33.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.911000 audit: BPF prog-id=23 op=LOAD May 15 00:46:33.913221 systemd[1]: Starting systemd-networkd.service... May 15 00:46:33.922000 audit: BPF prog-id=24 op=LOAD May 15 00:46:33.922000 audit: BPF prog-id=25 op=LOAD May 15 00:46:33.922000 audit: BPF prog-id=26 op=LOAD May 15 00:46:33.923830 systemd[1]: Starting systemd-userdbd.service... May 15 00:46:33.947939 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 00:46:33.950423 systemd[1]: Started systemd-userdbd.service. May 15 00:46:33.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.973881 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 00:46:33.977171 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 00:46:33.979020 kernel: ACPI: button: Power Button [PWRF] May 15 00:46:33.997468 systemd-networkd[1025]: lo: Link UP May 15 00:46:33.997477 systemd-networkd[1025]: lo: Gained carrier May 15 00:46:33.997810 systemd-networkd[1025]: Enumeration completed May 15 00:46:33.997900 systemd[1]: Started systemd-networkd.service. May 15 00:46:33.998643 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 00:46:33.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:33.999807 systemd-networkd[1025]: eth0: Link UP May 15 00:46:33.999816 systemd-networkd[1025]: eth0: Gained carrier May 15 00:46:34.009964 systemd-networkd[1025]: eth0: DHCPv4 address 10.0.0.19/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 00:46:34.012000 audit[1036]: AVC avc: denied { confidentiality } for pid=1036 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 00:46:34.012000 audit[1036]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56068e17bd90 a1=338ac a2=7fd09542ebc5 a3=5 items=110 ppid=1017 pid=1036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:34.012000 audit: CWD cwd="/" May 15 00:46:34.012000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=1 name=(null) inode=12172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=2 name=(null) inode=12172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=3 name=(null) inode=12173 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=4 name=(null) inode=12172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=5 name=(null) inode=12174 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=6 name=(null) inode=12172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=7 name=(null) inode=12175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=8 name=(null) inode=12175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=9 name=(null) inode=12176 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=10 name=(null) inode=12175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=11 name=(null) inode=12177 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=12 name=(null) inode=12175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=13 name=(null) inode=12178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=14 name=(null) inode=12175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=15 name=(null) inode=12179 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=16 name=(null) inode=12175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=17 name=(null) inode=12180 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=18 name=(null) inode=12172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=19 name=(null) inode=12181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=20 name=(null) inode=12181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=21 name=(null) inode=12182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=22 name=(null) inode=12181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=23 name=(null) inode=12183 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=24 name=(null) inode=12181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.024904 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 00:46:34.012000 audit: PATH item=25 name=(null) inode=12184 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=26 name=(null) inode=12181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=27 name=(null) inode=12185 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=28 name=(null) inode=12181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=29 name=(null) inode=12186 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=30 name=(null) inode=12172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=31 name=(null) inode=12187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=32 name=(null) inode=12187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=33 name=(null) inode=12188 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=34 name=(null) inode=12187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=35 name=(null) inode=12189 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=36 name=(null) inode=12187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=37 name=(null) inode=12190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=38 name=(null) inode=12187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=39 name=(null) inode=12191 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=40 name=(null) inode=12187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=41 name=(null) inode=12192 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=42 name=(null) inode=12172 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=43 name=(null) inode=12193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=44 name=(null) inode=12193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=45 name=(null) inode=12194 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=46 name=(null) inode=12193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=47 name=(null) inode=12195 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=48 name=(null) inode=12193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=49 name=(null) inode=12196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=50 name=(null) inode=12193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=51 name=(null) inode=12197 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=52 name=(null) inode=12193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=53 name=(null) inode=12198 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=55 name=(null) inode=12199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=56 name=(null) inode=12199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=57 name=(null) inode=12200 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=58 name=(null) inode=12199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=59 name=(null) inode=12201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=60 name=(null) inode=12199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=61 name=(null) inode=12202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=62 name=(null) inode=12202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=63 name=(null) inode=12203 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=64 name=(null) inode=12202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.027872 kernel: mousedev: PS/2 mouse device common for all mice May 15 00:46:34.012000 audit: PATH item=65 name=(null) inode=12204 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=66 name=(null) inode=12202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=67 name=(null) inode=12205 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=68 name=(null) inode=12202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=69 name=(null) inode=12206 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=70 name=(null) inode=12202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=71 name=(null) inode=12207 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=72 name=(null) inode=12199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=73 name=(null) inode=12208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=74 name=(null) inode=12208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=75 name=(null) inode=12209 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=76 name=(null) inode=12208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=77 name=(null) inode=12210 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=78 name=(null) inode=12208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=79 name=(null) inode=12211 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=80 name=(null) inode=12208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=81 name=(null) inode=12212 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=82 name=(null) inode=12208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=83 name=(null) inode=12213 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=84 name=(null) inode=12199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=85 name=(null) inode=12214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=86 name=(null) inode=12214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=87 name=(null) inode=12215 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=88 name=(null) inode=12214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=89 name=(null) inode=12216 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=90 name=(null) inode=12214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=91 name=(null) inode=12217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=92 name=(null) inode=12214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=93 name=(null) inode=12218 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=94 name=(null) inode=12214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=95 name=(null) inode=12219 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=96 name=(null) inode=12199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=97 name=(null) inode=12220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=98 name=(null) inode=12220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=99 name=(null) inode=12221 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=100 name=(null) inode=12220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=101 name=(null) inode=12222 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=102 name=(null) inode=12220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=103 name=(null) inode=12223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=104 name=(null) inode=12220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=105 name=(null) inode=12224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=106 name=(null) inode=12220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=107 name=(null) inode=12225 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PATH item=109 name=(null) inode=12226 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:46:34.012000 audit: PROCTITLE proctitle="(udev-worker)" May 15 00:46:34.039649 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 15 00:46:34.041978 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 15 00:46:34.042087 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 15 00:46:34.042186 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 15 00:46:34.082251 kernel: kvm: Nested Virtualization enabled May 15 00:46:34.082312 kernel: SVM: kvm: Nested Paging enabled May 15 00:46:34.082326 kernel: SVM: Virtual VMLOAD VMSAVE supported May 15 00:46:34.082339 kernel: SVM: Virtual GIF supported May 15 00:46:34.096872 kernel: EDAC MC: Ver: 3.0.0 May 15 00:46:34.121165 systemd[1]: Finished systemd-udev-settle.service. May 15 00:46:34.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.123119 systemd[1]: Starting lvm2-activation-early.service... May 15 00:46:34.131170 lvm[1053]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 00:46:34.156717 systemd[1]: Finished lvm2-activation-early.service. May 15 00:46:34.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.157779 systemd[1]: Reached target cryptsetup.target. May 15 00:46:34.159415 systemd[1]: Starting lvm2-activation.service... May 15 00:46:34.163411 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 00:46:34.192791 systemd[1]: Finished lvm2-activation.service. May 15 00:46:34.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.193914 systemd[1]: Reached target local-fs-pre.target. May 15 00:46:34.194796 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 00:46:34.194818 systemd[1]: Reached target local-fs.target. May 15 00:46:34.195633 systemd[1]: Reached target machines.target. May 15 00:46:34.197398 systemd[1]: Starting ldconfig.service... May 15 00:46:34.198330 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:46:34.198386 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:46:34.199201 systemd[1]: Starting systemd-boot-update.service... May 15 00:46:34.200815 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 00:46:34.202801 systemd[1]: Starting systemd-machine-id-commit.service... May 15 00:46:34.204584 systemd[1]: Starting systemd-sysext.service... May 15 00:46:34.205581 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1056 (bootctl) May 15 00:46:34.206306 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 00:46:34.213126 systemd[1]: Unmounting usr-share-oem.mount... May 15 00:46:34.216238 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 00:46:34.217926 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 00:46:34.218055 systemd[1]: Unmounted usr-share-oem.mount. May 15 00:46:34.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.227903 kernel: loop0: detected capacity change from 0 to 210664 May 15 00:46:34.252208 systemd-fsck[1064]: fsck.fat 4.2 (2021-01-31) May 15 00:46:34.252208 systemd-fsck[1064]: /dev/vda1: 791 files, 120710/258078 clusters May 15 00:46:34.254551 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 00:46:34.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.257639 systemd[1]: Mounting boot.mount... May 15 00:46:34.377972 systemd[1]: Mounted boot.mount. May 15 00:46:34.387210 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 00:46:34.388564 systemd[1]: Finished systemd-machine-id-commit.service. May 15 00:46:34.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.390819 systemd[1]: Finished systemd-boot-update.service. May 15 00:46:34.391970 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 00:46:34.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.412870 kernel: loop1: detected capacity change from 0 to 210664 May 15 00:46:34.417042 (sd-sysext)[1069]: Using extensions 'kubernetes'. May 15 00:46:34.417338 (sd-sysext)[1069]: Merged extensions into '/usr'. May 15 00:46:34.431933 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:46:34.433559 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:46:34.435641 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:46:34.437685 systemd[1]: Starting modprobe@loop.service... May 15 00:46:34.438633 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:46:34.438791 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:46:34.439767 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:46:34.439928 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:46:34.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.441329 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:46:34.441465 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:46:34.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.442762 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:46:34.442876 systemd[1]: Finished modprobe@loop.service. May 15 00:46:34.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.444091 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:46:34.444182 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:46:34.451222 ldconfig[1055]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 00:46:34.456302 systemd[1]: Finished ldconfig.service. May 15 00:46:34.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.457223 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:46:34.458445 systemd[1]: Mounting usr-share-oem.mount... May 15 00:46:34.459116 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:46:34.463869 systemd[1]: Mounted usr-share-oem.mount. May 15 00:46:34.465569 systemd[1]: Finished systemd-sysext.service. May 15 00:46:34.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.467242 systemd[1]: Starting ensure-sysext.service... May 15 00:46:34.468771 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 00:46:34.472911 systemd[1]: Reloading. May 15 00:46:34.479832 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 00:46:34.481470 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 00:46:34.484060 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 00:46:34.524900 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-15T00:46:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:46:34.524926 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-15T00:46:34Z" level=info msg="torcx already run" May 15 00:46:34.585885 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:46:34.585900 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:46:34.602260 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:46:34.652000 audit: BPF prog-id=27 op=LOAD May 15 00:46:34.652000 audit: BPF prog-id=24 op=UNLOAD May 15 00:46:34.652000 audit: BPF prog-id=28 op=LOAD May 15 00:46:34.652000 audit: BPF prog-id=29 op=LOAD May 15 00:46:34.652000 audit: BPF prog-id=25 op=UNLOAD May 15 00:46:34.652000 audit: BPF prog-id=26 op=UNLOAD May 15 00:46:34.652000 audit: BPF prog-id=30 op=LOAD May 15 00:46:34.652000 audit: BPF prog-id=18 op=UNLOAD May 15 00:46:34.653000 audit: BPF prog-id=31 op=LOAD May 15 00:46:34.653000 audit: BPF prog-id=32 op=LOAD May 15 00:46:34.653000 audit: BPF prog-id=19 op=UNLOAD May 15 00:46:34.653000 audit: BPF prog-id=20 op=UNLOAD May 15 00:46:34.654000 audit: BPF prog-id=33 op=LOAD May 15 00:46:34.654000 audit: BPF prog-id=34 op=LOAD May 15 00:46:34.654000 audit: BPF prog-id=21 op=UNLOAD May 15 00:46:34.654000 audit: BPF prog-id=22 op=UNLOAD May 15 00:46:34.655000 audit: BPF prog-id=35 op=LOAD May 15 00:46:34.655000 audit: BPF prog-id=23 op=UNLOAD May 15 00:46:34.658591 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 00:46:34.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.662868 systemd[1]: Starting audit-rules.service... May 15 00:46:34.664678 systemd[1]: Starting clean-ca-certificates.service... May 15 00:46:34.666504 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 00:46:34.667000 audit: BPF prog-id=36 op=LOAD May 15 00:46:34.668781 systemd[1]: Starting systemd-resolved.service... May 15 00:46:34.669000 audit: BPF prog-id=37 op=LOAD May 15 00:46:34.670780 systemd[1]: Starting systemd-timesyncd.service... May 15 00:46:34.672327 systemd[1]: Starting systemd-update-utmp.service... May 15 00:46:34.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.673583 systemd[1]: Finished clean-ca-certificates.service. May 15 00:46:34.675000 audit[1147]: SYSTEM_BOOT pid=1147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 00:46:34.676145 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:46:34.680844 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:46:34.681119 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:46:34.682282 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:46:34.684427 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:46:34.686285 systemd[1]: Starting modprobe@loop.service... May 15 00:46:34.687112 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:46:34.687262 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:46:34.687410 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:46:34.687524 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:46:34.688739 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:46:34.688866 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:46:34.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.690147 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:46:34.690241 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:46:34.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.691591 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:46:34.691682 systemd[1]: Finished modprobe@loop.service. May 15 00:46:34.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.692943 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:46:34.693069 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:46:34.694302 systemd[1]: Finished systemd-update-utmp.service. May 15 00:46:34.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:34.694000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 00:46:34.694000 audit[1161]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcc18ed2b0 a2=420 a3=0 items=0 ppid=1137 pid=1161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:34.694000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 00:46:34.696827 systemd[1]: Finished audit-rules.service. May 15 00:46:34.697627 augenrules[1161]: No rules May 15 00:46:34.697937 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:46:34.698112 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:46:34.699265 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:46:34.701039 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:46:34.702731 systemd[1]: Starting modprobe@loop.service... May 15 00:46:34.703595 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:46:34.703686 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:46:34.703770 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:46:34.703829 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:46:34.704925 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 00:46:34.706355 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:46:34.706460 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:46:34.707587 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:46:34.707690 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:46:34.708899 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:46:34.709042 systemd[1]: Finished modprobe@loop.service. May 15 00:46:34.710139 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:46:34.710236 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:46:34.711678 systemd[1]: Starting systemd-update-done.service... May 15 00:46:34.715335 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:46:34.715549 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 00:46:34.716541 systemd[1]: Starting modprobe@dm_mod.service... May 15 00:46:34.718345 systemd[1]: Starting modprobe@drm.service... May 15 00:46:34.720021 systemd[1]: Starting modprobe@efi_pstore.service... May 15 00:46:34.721889 systemd[1]: Starting modprobe@loop.service... May 15 00:46:34.722724 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 00:46:34.722829 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:46:34.723829 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 00:46:34.724922 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 00:46:34.725031 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 00:46:34.726118 systemd[1]: Finished systemd-update-done.service. May 15 00:46:34.727544 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 00:46:34.727688 systemd[1]: Finished modprobe@dm_mod.service. May 15 00:46:34.728419 systemd-resolved[1142]: Positive Trust Anchors: May 15 00:46:34.728669 systemd-resolved[1142]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 00:46:34.728760 systemd-resolved[1142]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 00:46:34.729002 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 00:46:34.729105 systemd[1]: Finished modprobe@drm.service. May 15 00:46:34.730392 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 00:46:34.730486 systemd[1]: Finished modprobe@efi_pstore.service. May 15 00:46:34.731776 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 00:46:34.731944 systemd[1]: Finished modprobe@loop.service. May 15 00:46:34.733331 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 00:46:34.733423 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 00:46:34.734506 systemd[1]: Finished ensure-sysext.service. May 15 00:46:34.737333 systemd-resolved[1142]: Defaulting to hostname 'linux'. May 15 00:46:34.738679 systemd[1]: Started systemd-resolved.service. May 15 00:46:34.739816 systemd[1]: Started systemd-timesyncd.service. May 15 00:46:35.537290 systemd-resolved[1142]: Clock change detected. Flushing caches. May 15 00:46:35.537324 systemd-timesyncd[1144]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 00:46:35.537360 systemd-timesyncd[1144]: Initial clock synchronization to Thu 2025-05-15 00:46:35.537259 UTC. May 15 00:46:35.538196 systemd[1]: Reached target network.target. May 15 00:46:35.539210 systemd[1]: Reached target nss-lookup.target. May 15 00:46:35.540214 systemd[1]: Reached target sysinit.target. May 15 00:46:35.541112 systemd[1]: Started motdgen.path. May 15 00:46:35.541911 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 00:46:35.543120 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 00:46:35.544156 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 00:46:35.544185 systemd[1]: Reached target paths.target. May 15 00:46:35.545053 systemd[1]: Reached target time-set.target. May 15 00:46:35.545992 systemd[1]: Started logrotate.timer. May 15 00:46:35.546836 systemd[1]: Started mdadm.timer. May 15 00:46:35.547547 systemd[1]: Reached target timers.target. May 15 00:46:35.548591 systemd[1]: Listening on dbus.socket. May 15 00:46:35.550213 systemd[1]: Starting docker.socket... May 15 00:46:35.552992 systemd[1]: Listening on sshd.socket. May 15 00:46:35.553865 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:46:35.554183 systemd[1]: Listening on docker.socket. May 15 00:46:35.555023 systemd[1]: Reached target sockets.target. May 15 00:46:35.555831 systemd[1]: Reached target basic.target. May 15 00:46:35.556646 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 00:46:35.556668 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 00:46:35.557443 systemd[1]: Starting containerd.service... May 15 00:46:35.558984 systemd[1]: Starting dbus.service... May 15 00:46:35.560470 systemd[1]: Starting enable-oem-cloudinit.service... May 15 00:46:35.562398 systemd[1]: Starting extend-filesystems.service... May 15 00:46:35.563370 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 00:46:35.564339 jq[1180]: false May 15 00:46:35.564224 systemd[1]: Starting motdgen.service... May 15 00:46:35.565934 systemd[1]: Starting prepare-helm.service... May 15 00:46:35.567583 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 00:46:35.569374 systemd[1]: Starting sshd-keygen.service... May 15 00:46:35.572627 systemd[1]: Starting systemd-logind.service... May 15 00:46:35.573422 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 00:46:35.573473 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 00:46:35.573925 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 00:46:35.574630 systemd[1]: Starting update-engine.service... May 15 00:46:35.576222 extend-filesystems[1181]: Found loop1 May 15 00:46:35.577443 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 00:46:35.577648 extend-filesystems[1181]: Found sr0 May 15 00:46:35.580019 extend-filesystems[1181]: Found vda May 15 00:46:35.580019 extend-filesystems[1181]: Found vda1 May 15 00:46:35.580019 extend-filesystems[1181]: Found vda2 May 15 00:46:35.580019 extend-filesystems[1181]: Found vda3 May 15 00:46:35.580019 extend-filesystems[1181]: Found usr May 15 00:46:35.580019 extend-filesystems[1181]: Found vda4 May 15 00:46:35.580019 extend-filesystems[1181]: Found vda6 May 15 00:46:35.580019 extend-filesystems[1181]: Found vda7 May 15 00:46:35.586850 extend-filesystems[1181]: Found vda9 May 15 00:46:35.586850 extend-filesystems[1181]: Checking size of /dev/vda9 May 15 00:46:35.584868 dbus-daemon[1179]: [system] SELinux support is enabled May 15 00:46:35.588500 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 00:46:35.588641 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 00:46:35.588799 systemd[1]: Started dbus.service. May 15 00:46:35.592372 systemd[1]: motdgen.service: Deactivated successfully. May 15 00:46:35.592627 systemd[1]: Finished motdgen.service. May 15 00:46:35.593509 extend-filesystems[1181]: Resized partition /dev/vda9 May 15 00:46:35.595461 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 00:46:35.595640 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 00:46:35.597859 jq[1198]: true May 15 00:46:35.598604 extend-filesystems[1205]: resize2fs 1.46.5 (30-Dec-2021) May 15 00:46:35.602752 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 00:46:35.602779 systemd[1]: Reached target system-config.target. May 15 00:46:35.604586 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 00:46:35.604607 systemd[1]: Reached target user-config.target. May 15 00:46:35.605933 jq[1208]: true May 15 00:46:35.613253 tar[1206]: linux-amd64/helm May 15 00:46:35.617305 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 00:46:35.622670 systemd-logind[1191]: Watching system buttons on /dev/input/event1 (Power Button) May 15 00:46:35.622694 systemd-logind[1191]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 00:46:35.624132 systemd-logind[1191]: New seat seat0. May 15 00:46:35.630234 update_engine[1193]: I0515 00:46:35.630115 1193 main.cc:92] Flatcar Update Engine starting May 15 00:46:35.631150 systemd[1]: Started systemd-logind.service. May 15 00:46:35.633723 env[1207]: time="2025-05-15T00:46:35.633689163Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 00:46:35.636252 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 00:46:35.638089 systemd[1]: Started update-engine.service. May 15 00:46:35.638162 update_engine[1193]: I0515 00:46:35.638131 1193 update_check_scheduler.cc:74] Next update check in 6m21s May 15 00:46:35.640876 systemd[1]: Started locksmithd.service. May 15 00:46:35.654991 env[1207]: time="2025-05-15T00:46:35.654970316Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 00:46:35.664530 extend-filesystems[1205]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 00:46:35.664530 extend-filesystems[1205]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 00:46:35.664530 extend-filesystems[1205]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 00:46:35.668510 extend-filesystems[1181]: Resized filesystem in /dev/vda9 May 15 00:46:35.668472 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 00:46:35.669572 env[1207]: time="2025-05-15T00:46:35.664925646Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 00:46:35.669572 env[1207]: time="2025-05-15T00:46:35.667783619Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 00:46:35.669572 env[1207]: time="2025-05-15T00:46:35.667808125Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 00:46:35.669572 env[1207]: time="2025-05-15T00:46:35.669204215Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 00:46:35.669572 env[1207]: time="2025-05-15T00:46:35.669232087Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 00:46:35.669572 env[1207]: time="2025-05-15T00:46:35.669253187Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 00:46:35.669572 env[1207]: time="2025-05-15T00:46:35.669261462Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 00:46:35.669572 env[1207]: time="2025-05-15T00:46:35.669324561Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 00:46:35.669587 systemd[1]: Finished extend-filesystems.service. May 15 00:46:35.670012 env[1207]: time="2025-05-15T00:46:35.669996221Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 00:46:35.670199 env[1207]: time="2025-05-15T00:46:35.670181298Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 00:46:35.670305 env[1207]: time="2025-05-15T00:46:35.670288069Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 00:46:35.670445 env[1207]: time="2025-05-15T00:46:35.670419195Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 00:46:35.670542 env[1207]: time="2025-05-15T00:46:35.670525725Z" level=info msg="metadata content store policy set" policy=shared May 15 00:46:35.674893 bash[1230]: Updated "/home/core/.ssh/authorized_keys" May 15 00:46:35.675605 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679065890Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679099072Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679111365Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679135210Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679146431Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679162401Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679173762Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679186706Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679198448Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679209629Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679220059Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 00:46:35.679302 env[1207]: time="2025-05-15T00:46:35.679230689Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.679689169Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.679781923Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.679970257Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.679990284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.680000824Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.680038094Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.680048634Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.680059053Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.680068090Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.680079281Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.680091234Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.680101302Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.680111371Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.680122813Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 00:46:35.682260 env[1207]: time="2025-05-15T00:46:35.680216178Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 00:46:35.681389 systemd[1]: Started containerd.service. May 15 00:46:35.682622 env[1207]: time="2025-05-15T00:46:35.680228551Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682622 env[1207]: time="2025-05-15T00:46:35.680297470Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682622 env[1207]: time="2025-05-15T00:46:35.680319291Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 00:46:35.682622 env[1207]: time="2025-05-15T00:46:35.680331194Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 00:46:35.682622 env[1207]: time="2025-05-15T00:46:35.680340211Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 00:46:35.682622 env[1207]: time="2025-05-15T00:46:35.680357263Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 00:46:35.682622 env[1207]: time="2025-05-15T00:46:35.680386678Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 00:46:35.682767 env[1207]: time="2025-05-15T00:46:35.680541809Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 00:46:35.682767 env[1207]: time="2025-05-15T00:46:35.680588797Z" level=info msg="Connect containerd service" May 15 00:46:35.682767 env[1207]: time="2025-05-15T00:46:35.680613864Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 00:46:35.682767 env[1207]: time="2025-05-15T00:46:35.681050754Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 00:46:35.682767 env[1207]: time="2025-05-15T00:46:35.681216986Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 00:46:35.682767 env[1207]: time="2025-05-15T00:46:35.681260227Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 00:46:35.682767 env[1207]: time="2025-05-15T00:46:35.681298930Z" level=info msg="containerd successfully booted in 0.048445s" May 15 00:46:35.683527 env[1207]: time="2025-05-15T00:46:35.682879065Z" level=info msg="Start subscribing containerd event" May 15 00:46:35.683527 env[1207]: time="2025-05-15T00:46:35.682927696Z" level=info msg="Start recovering state" May 15 00:46:35.683527 env[1207]: time="2025-05-15T00:46:35.682976628Z" level=info msg="Start event monitor" May 15 00:46:35.683527 env[1207]: time="2025-05-15T00:46:35.682986867Z" level=info msg="Start snapshots syncer" May 15 00:46:35.683527 env[1207]: time="2025-05-15T00:46:35.682993860Z" level=info msg="Start cni network conf syncer for default" May 15 00:46:35.683527 env[1207]: time="2025-05-15T00:46:35.683000142Z" level=info msg="Start streaming server" May 15 00:46:35.694117 locksmithd[1234]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 00:46:35.876166 sshd_keygen[1199]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 00:46:35.893572 systemd[1]: Finished sshd-keygen.service. May 15 00:46:35.895650 systemd[1]: Starting issuegen.service... May 15 00:46:35.900880 systemd[1]: issuegen.service: Deactivated successfully. May 15 00:46:35.901002 systemd[1]: Finished issuegen.service. May 15 00:46:35.902887 systemd[1]: Starting systemd-user-sessions.service... May 15 00:46:35.908188 systemd[1]: Finished systemd-user-sessions.service. May 15 00:46:35.910478 systemd[1]: Started getty@tty1.service. May 15 00:46:35.912453 systemd[1]: Started serial-getty@ttyS0.service. May 15 00:46:35.913483 systemd[1]: Reached target getty.target. May 15 00:46:35.977545 tar[1206]: linux-amd64/LICENSE May 15 00:46:35.977672 tar[1206]: linux-amd64/README.md May 15 00:46:35.981484 systemd[1]: Finished prepare-helm.service. May 15 00:46:36.181446 systemd-networkd[1025]: eth0: Gained IPv6LL May 15 00:46:36.183083 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 00:46:36.184440 systemd[1]: Reached target network-online.target. May 15 00:46:36.186700 systemd[1]: Starting kubelet.service... May 15 00:46:36.720874 systemd[1]: Started kubelet.service. May 15 00:46:36.722028 systemd[1]: Reached target multi-user.target. May 15 00:46:36.723798 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 00:46:36.729775 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 00:46:36.729897 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 00:46:36.730919 systemd[1]: Startup finished in 588ms (kernel) + 4.339s (initrd) + 4.903s (userspace) = 9.830s. May 15 00:46:37.352661 kubelet[1261]: E0515 00:46:37.352567 1261 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 00:46:37.354162 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 00:46:37.354297 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 00:46:37.354562 systemd[1]: kubelet.service: Consumed 1.117s CPU time. May 15 00:46:40.654755 systemd[1]: Created slice system-sshd.slice. May 15 00:46:40.655696 systemd[1]: Started sshd@0-10.0.0.19:22-10.0.0.1:60174.service. May 15 00:46:40.686122 sshd[1271]: Accepted publickey for core from 10.0.0.1 port 60174 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:46:40.688170 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:46:40.695231 systemd[1]: Created slice user-500.slice. May 15 00:46:40.696208 systemd[1]: Starting user-runtime-dir@500.service... May 15 00:46:40.698024 systemd-logind[1191]: New session 1 of user core. May 15 00:46:40.703946 systemd[1]: Finished user-runtime-dir@500.service. May 15 00:46:40.705399 systemd[1]: Starting user@500.service... May 15 00:46:40.707881 (systemd)[1274]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 00:46:40.773683 systemd[1274]: Queued start job for default target default.target. May 15 00:46:40.774050 systemd[1274]: Reached target paths.target. May 15 00:46:40.774069 systemd[1274]: Reached target sockets.target. May 15 00:46:40.774079 systemd[1274]: Reached target timers.target. May 15 00:46:40.774090 systemd[1274]: Reached target basic.target. May 15 00:46:40.774126 systemd[1274]: Reached target default.target. May 15 00:46:40.774152 systemd[1274]: Startup finished in 60ms. May 15 00:46:40.774220 systemd[1]: Started user@500.service. May 15 00:46:40.775098 systemd[1]: Started session-1.scope. May 15 00:46:40.824739 systemd[1]: Started sshd@1-10.0.0.19:22-10.0.0.1:60176.service. May 15 00:46:40.853020 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 60176 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:46:40.854173 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:46:40.857782 systemd-logind[1191]: New session 2 of user core. May 15 00:46:40.858795 systemd[1]: Started session-2.scope. May 15 00:46:40.911004 sshd[1283]: pam_unix(sshd:session): session closed for user core May 15 00:46:40.913862 systemd[1]: sshd@1-10.0.0.19:22-10.0.0.1:60176.service: Deactivated successfully. May 15 00:46:40.914503 systemd[1]: session-2.scope: Deactivated successfully. May 15 00:46:40.915039 systemd-logind[1191]: Session 2 logged out. Waiting for processes to exit. May 15 00:46:40.916078 systemd[1]: Started sshd@2-10.0.0.19:22-10.0.0.1:60188.service. May 15 00:46:40.916896 systemd-logind[1191]: Removed session 2. May 15 00:46:40.943976 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 60188 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:46:40.945002 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:46:40.947811 systemd-logind[1191]: New session 3 of user core. May 15 00:46:40.948462 systemd[1]: Started session-3.scope. May 15 00:46:40.996548 sshd[1289]: pam_unix(sshd:session): session closed for user core May 15 00:46:40.999256 systemd[1]: sshd@2-10.0.0.19:22-10.0.0.1:60188.service: Deactivated successfully. May 15 00:46:40.999739 systemd[1]: session-3.scope: Deactivated successfully. May 15 00:46:41.000158 systemd-logind[1191]: Session 3 logged out. Waiting for processes to exit. May 15 00:46:41.001030 systemd[1]: Started sshd@3-10.0.0.19:22-10.0.0.1:60204.service. May 15 00:46:41.001651 systemd-logind[1191]: Removed session 3. May 15 00:46:41.029413 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 60204 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:46:41.030357 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:46:41.033224 systemd-logind[1191]: New session 4 of user core. May 15 00:46:41.034009 systemd[1]: Started session-4.scope. May 15 00:46:41.085760 sshd[1295]: pam_unix(sshd:session): session closed for user core May 15 00:46:41.088100 systemd[1]: sshd@3-10.0.0.19:22-10.0.0.1:60204.service: Deactivated successfully. May 15 00:46:41.088674 systemd[1]: session-4.scope: Deactivated successfully. May 15 00:46:41.089218 systemd-logind[1191]: Session 4 logged out. Waiting for processes to exit. May 15 00:46:41.090069 systemd[1]: Started sshd@4-10.0.0.19:22-10.0.0.1:60208.service. May 15 00:46:41.090795 systemd-logind[1191]: Removed session 4. May 15 00:46:41.117425 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 60208 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:46:41.118285 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:46:41.121024 systemd-logind[1191]: New session 5 of user core. May 15 00:46:41.121687 systemd[1]: Started session-5.scope. May 15 00:46:41.174196 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 00:46:41.174376 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:46:41.183449 dbus-daemon[1179]: \xd0mƶTV: received setenforce notice (enforcing=2080233744) May 15 00:46:41.185247 sudo[1304]: pam_unix(sudo:session): session closed for user root May 15 00:46:41.186666 sshd[1301]: pam_unix(sshd:session): session closed for user core May 15 00:46:41.189257 systemd[1]: sshd@4-10.0.0.19:22-10.0.0.1:60208.service: Deactivated successfully. May 15 00:46:41.189772 systemd[1]: session-5.scope: Deactivated successfully. May 15 00:46:41.190206 systemd-logind[1191]: Session 5 logged out. Waiting for processes to exit. May 15 00:46:41.191230 systemd[1]: Started sshd@5-10.0.0.19:22-10.0.0.1:60220.service. May 15 00:46:41.191900 systemd-logind[1191]: Removed session 5. May 15 00:46:41.220495 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 60220 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:46:41.221487 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:46:41.224760 systemd-logind[1191]: New session 6 of user core. May 15 00:46:41.225688 systemd[1]: Started session-6.scope. May 15 00:46:41.277540 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 00:46:41.277726 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:46:41.280827 sudo[1312]: pam_unix(sudo:session): session closed for user root May 15 00:46:41.285888 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 00:46:41.286099 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:46:41.295820 systemd[1]: Stopping audit-rules.service... May 15 00:46:41.295000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 00:46:41.297046 auditctl[1315]: No rules May 15 00:46:41.297428 systemd[1]: audit-rules.service: Deactivated successfully. May 15 00:46:41.297583 systemd[1]: Stopped audit-rules.service. May 15 00:46:41.297820 kernel: kauditd_printk_skb: 231 callbacks suppressed May 15 00:46:41.297858 kernel: audit: type=1305 audit(1747270001.295:192): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 00:46:41.298915 systemd[1]: Starting audit-rules.service... May 15 00:46:41.295000 audit[1315]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffed7f91a60 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.304527 kernel: audit: type=1300 audit(1747270001.295:192): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffed7f91a60 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.304562 kernel: audit: type=1327 audit(1747270001.295:192): proctitle=2F7362696E2F617564697463746C002D44 May 15 00:46:41.295000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 00:46:41.306522 kernel: audit: type=1131 audit(1747270001.296:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:41.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:41.314280 augenrules[1332]: No rules May 15 00:46:41.314786 systemd[1]: Finished audit-rules.service. May 15 00:46:41.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:41.315592 sudo[1311]: pam_unix(sudo:session): session closed for user root May 15 00:46:41.316827 sshd[1308]: pam_unix(sshd:session): session closed for user core May 15 00:46:41.314000 audit[1311]: USER_END pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:46:41.319411 systemd[1]: sshd@5-10.0.0.19:22-10.0.0.1:60220.service: Deactivated successfully. May 15 00:46:41.319859 systemd[1]: session-6.scope: Deactivated successfully. May 15 00:46:41.320354 systemd-logind[1191]: Session 6 logged out. Waiting for processes to exit. May 15 00:46:41.321316 systemd[1]: Started sshd@6-10.0.0.19:22-10.0.0.1:60234.service. May 15 00:46:41.322094 systemd-logind[1191]: Removed session 6. May 15 00:46:41.322176 kernel: audit: type=1130 audit(1747270001.313:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:41.322263 kernel: audit: type=1106 audit(1747270001.314:195): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:46:41.322281 kernel: audit: type=1104 audit(1747270001.314:196): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:46:41.314000 audit[1311]: CRED_DISP pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:46:41.316000 audit[1308]: USER_END pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:46:41.329644 kernel: audit: type=1106 audit(1747270001.316:197): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:46:41.329686 kernel: audit: type=1104 audit(1747270001.316:198): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:46:41.316000 audit[1308]: CRED_DISP pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:46:41.333080 kernel: audit: type=1131 audit(1747270001.318:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.19:22-10.0.0.1:60220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:41.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.19:22-10.0.0.1:60220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:41.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:60234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:41.348000 audit[1338]: USER_ACCT pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:46:41.350159 sshd[1338]: Accepted publickey for core from 10.0.0.1 port 60234 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:46:41.349000 audit[1338]: CRED_ACQ pid=1338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:46:41.349000 audit[1338]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdae94a590 a2=3 a3=0 items=0 ppid=1 pid=1338 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.349000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:46:41.351080 sshd[1338]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:46:41.354185 systemd-logind[1191]: New session 7 of user core. May 15 00:46:41.354909 systemd[1]: Started session-7.scope. May 15 00:46:41.356000 audit[1338]: USER_START pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:46:41.357000 audit[1341]: CRED_ACQ pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:46:41.404000 audit[1342]: USER_ACCT pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:46:41.404000 audit[1342]: CRED_REFR pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:46:41.405494 sudo[1342]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 00:46:41.405688 sudo[1342]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 00:46:41.406000 audit[1342]: USER_START pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:46:41.427788 systemd[1]: Starting docker.service... May 15 00:46:41.481265 env[1354]: time="2025-05-15T00:46:41.481206140Z" level=info msg="Starting up" May 15 00:46:41.482449 env[1354]: time="2025-05-15T00:46:41.482417012Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 00:46:41.482449 env[1354]: time="2025-05-15T00:46:41.482440185Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 00:46:41.482535 env[1354]: time="2025-05-15T00:46:41.482456656Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 00:46:41.482535 env[1354]: time="2025-05-15T00:46:41.482466124Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 00:46:41.483819 env[1354]: time="2025-05-15T00:46:41.483792693Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 00:46:41.483819 env[1354]: time="2025-05-15T00:46:41.483808823Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 00:46:41.483888 env[1354]: time="2025-05-15T00:46:41.483820205Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 00:46:41.483888 env[1354]: time="2025-05-15T00:46:41.483828270Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 00:46:41.891611 env[1354]: time="2025-05-15T00:46:41.891562744Z" level=info msg="Loading containers: start." May 15 00:46:41.939000 audit[1388]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:41.939000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe44bf0a50 a2=0 a3=7ffe44bf0a3c items=0 ppid=1354 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.939000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 00:46:41.940000 audit[1390]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:41.940000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd940f8980 a2=0 a3=7ffd940f896c items=0 ppid=1354 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 00:46:41.942000 audit[1392]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:41.942000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffee4c13150 a2=0 a3=7ffee4c1313c items=0 ppid=1354 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.942000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 00:46:41.948000 audit[1395]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:41.948000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe948b0020 a2=0 a3=7ffe948b000c items=0 ppid=1354 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.948000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 00:46:41.950000 audit[1397]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:41.950000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd52d832e0 a2=0 a3=7ffd52d832cc items=0 ppid=1354 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.950000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 00:46:41.971000 audit[1402]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:41.971000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd050318c0 a2=0 a3=7ffd050318ac items=0 ppid=1354 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.971000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 00:46:41.979000 audit[1404]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:41.979000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffceaa1e670 a2=0 a3=7ffceaa1e65c items=0 ppid=1354 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.979000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 00:46:41.980000 audit[1406]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:41.980000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd475421d0 a2=0 a3=7ffd475421bc items=0 ppid=1354 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 00:46:41.982000 audit[1408]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:41.982000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffda7081f00 a2=0 a3=7ffda7081eec items=0 ppid=1354 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.982000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 00:46:41.990000 audit[1412]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:41.990000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffc69d32e0 a2=0 a3=7fffc69d32cc items=0 ppid=1354 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 00:46:41.996000 audit[1413]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:41.996000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe82a92730 a2=0 a3=7ffe82a9271c items=0 ppid=1354 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:41.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 00:46:42.006265 kernel: Initializing XFRM netlink socket May 15 00:46:42.033143 env[1354]: time="2025-05-15T00:46:42.033100710Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 00:46:42.046000 audit[1421]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.046000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd193bd930 a2=0 a3=7ffd193bd91c items=0 ppid=1354 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.046000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 00:46:42.055000 audit[1424]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.055000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdb213e720 a2=0 a3=7ffdb213e70c items=0 ppid=1354 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.055000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 00:46:42.058000 audit[1427]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.058000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffda4f16e60 a2=0 a3=7ffda4f16e4c items=0 ppid=1354 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.058000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 00:46:42.060000 audit[1429]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.060000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd9f023190 a2=0 a3=7ffd9f02317c items=0 ppid=1354 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.060000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 00:46:42.061000 audit[1431]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.061000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffcba37f8a0 a2=0 a3=7ffcba37f88c items=0 ppid=1354 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.061000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 00:46:42.063000 audit[1433]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.063000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffcf966d460 a2=0 a3=7ffcf966d44c items=0 ppid=1354 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.063000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 00:46:42.064000 audit[1435]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.064000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffdc5c99e0 a2=0 a3=7fffdc5c99cc items=0 ppid=1354 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.064000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 00:46:42.071000 audit[1438]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.071000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffcb3202dc0 a2=0 a3=7ffcb3202dac items=0 ppid=1354 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.071000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 00:46:42.072000 audit[1440]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.072000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd55e91bb0 a2=0 a3=7ffd55e91b9c items=0 ppid=1354 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.072000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 00:46:42.074000 audit[1442]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.074000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd54d2d060 a2=0 a3=7ffd54d2d04c items=0 ppid=1354 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.074000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 00:46:42.075000 audit[1444]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.075000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffedaabbe80 a2=0 a3=7ffedaabbe6c items=0 ppid=1354 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.075000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 00:46:42.077567 systemd-networkd[1025]: docker0: Link UP May 15 00:46:42.085000 audit[1448]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.085000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdbccb2080 a2=0 a3=7ffdbccb206c items=0 ppid=1354 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.085000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 00:46:42.093000 audit[1449]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:46:42.093000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd4a205180 a2=0 a3=7ffd4a20516c items=0 ppid=1354 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:46:42.093000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 00:46:42.095302 env[1354]: time="2025-05-15T00:46:42.095265297Z" level=info msg="Loading containers: done." May 15 00:46:42.107442 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2038802816-merged.mount: Deactivated successfully. May 15 00:46:42.113159 env[1354]: time="2025-05-15T00:46:42.113116344Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 00:46:42.113347 env[1354]: time="2025-05-15T00:46:42.113320767Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 00:46:42.113449 env[1354]: time="2025-05-15T00:46:42.113427407Z" level=info msg="Daemon has completed initialization" May 15 00:46:42.132715 systemd[1]: Started docker.service. May 15 00:46:42.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:42.136103 env[1354]: time="2025-05-15T00:46:42.136053574Z" level=info msg="API listen on /run/docker.sock" May 15 00:46:43.280637 env[1207]: time="2025-05-15T00:46:43.280570949Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 15 00:46:43.937407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount418828261.mount: Deactivated successfully. May 15 00:46:45.665094 env[1207]: time="2025-05-15T00:46:45.665016149Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:45.666992 env[1207]: time="2025-05-15T00:46:45.666933637Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:45.670007 env[1207]: time="2025-05-15T00:46:45.669986806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:45.671960 env[1207]: time="2025-05-15T00:46:45.671908913Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:45.672545 env[1207]: time="2025-05-15T00:46:45.672516483Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 15 00:46:45.682659 env[1207]: time="2025-05-15T00:46:45.682629629Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 15 00:46:47.461463 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 00:46:47.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:47.461662 systemd[1]: Stopped kubelet.service. May 15 00:46:47.461712 systemd[1]: kubelet.service: Consumed 1.117s CPU time. May 15 00:46:47.462569 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 00:46:47.462613 kernel: audit: type=1130 audit(1747270007.460:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:47.463066 systemd[1]: Starting kubelet.service... May 15 00:46:47.473275 kernel: audit: type=1131 audit(1747270007.460:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:47.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:47.537202 systemd[1]: Started kubelet.service. May 15 00:46:47.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:47.541250 kernel: audit: type=1130 audit(1747270007.536:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:47.987628 env[1207]: time="2025-05-15T00:46:47.987585353Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:47.989643 env[1207]: time="2025-05-15T00:46:47.989617657Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:47.993162 env[1207]: time="2025-05-15T00:46:47.993135608Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:47.995907 env[1207]: time="2025-05-15T00:46:47.995870199Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:47.996038 kubelet[1503]: E0515 00:46:47.996013 1503 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 00:46:47.996561 env[1207]: time="2025-05-15T00:46:47.996532171Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 15 00:46:47.998657 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 00:46:47.998769 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 00:46:47.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:46:48.002258 kernel: audit: type=1131 audit(1747270007.997:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:46:48.005760 env[1207]: time="2025-05-15T00:46:48.005738116Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 15 00:46:49.600532 env[1207]: time="2025-05-15T00:46:49.600469755Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:49.602564 env[1207]: time="2025-05-15T00:46:49.602524200Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:49.604708 env[1207]: time="2025-05-15T00:46:49.604673714Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:49.606428 env[1207]: time="2025-05-15T00:46:49.606406635Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:49.607865 env[1207]: time="2025-05-15T00:46:49.607835677Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 15 00:46:49.626124 env[1207]: time="2025-05-15T00:46:49.626089900Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 15 00:46:50.899784 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3739566874.mount: Deactivated successfully. May 15 00:46:51.520380 env[1207]: time="2025-05-15T00:46:51.520315959Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:51.523593 env[1207]: time="2025-05-15T00:46:51.523557762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:51.524942 env[1207]: time="2025-05-15T00:46:51.524913606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:51.526263 env[1207]: time="2025-05-15T00:46:51.526229455Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:51.526586 env[1207]: time="2025-05-15T00:46:51.526560366Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 15 00:46:51.534924 env[1207]: time="2025-05-15T00:46:51.534891379Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 15 00:46:51.983294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2304906094.mount: Deactivated successfully. May 15 00:46:53.362531 env[1207]: time="2025-05-15T00:46:53.362483645Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:53.364414 env[1207]: time="2025-05-15T00:46:53.364390603Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:53.366201 env[1207]: time="2025-05-15T00:46:53.366158119Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:53.367921 env[1207]: time="2025-05-15T00:46:53.367899367Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:53.369776 env[1207]: time="2025-05-15T00:46:53.369737756Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 15 00:46:53.385173 env[1207]: time="2025-05-15T00:46:53.385137202Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 15 00:46:53.880560 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1841007683.mount: Deactivated successfully. May 15 00:46:53.886616 env[1207]: time="2025-05-15T00:46:53.886569023Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:53.889122 env[1207]: time="2025-05-15T00:46:53.889078201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:53.890854 env[1207]: time="2025-05-15T00:46:53.890819749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:53.892267 env[1207]: time="2025-05-15T00:46:53.892233372Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:53.892699 env[1207]: time="2025-05-15T00:46:53.892663830Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 15 00:46:53.901734 env[1207]: time="2025-05-15T00:46:53.901689335Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 15 00:46:54.526736 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1378327233.mount: Deactivated successfully. May 15 00:46:57.509459 env[1207]: time="2025-05-15T00:46:57.509371472Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:57.512121 env[1207]: time="2025-05-15T00:46:57.512093119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:57.517381 env[1207]: time="2025-05-15T00:46:57.517344413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:57.519697 env[1207]: time="2025-05-15T00:46:57.519664486Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:46:57.520706 env[1207]: time="2025-05-15T00:46:57.520672758Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 15 00:46:58.022280 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 00:46:58.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:58.022481 systemd[1]: Stopped kubelet.service. May 15 00:46:58.023729 systemd[1]: Starting kubelet.service... May 15 00:46:58.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:58.028612 kernel: audit: type=1130 audit(1747270018.021:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:58.028665 kernel: audit: type=1131 audit(1747270018.021:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:58.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:58.098064 systemd[1]: Started kubelet.service. May 15 00:46:58.102352 kernel: audit: type=1130 audit(1747270018.097:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:46:58.138148 kubelet[1620]: E0515 00:46:58.138108 1620 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 00:46:58.140184 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 00:46:58.140320 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 00:46:58.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:46:58.144258 kernel: audit: type=1131 audit(1747270018.139:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 00:47:00.422645 systemd[1]: Stopped kubelet.service. May 15 00:47:00.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:00.424513 systemd[1]: Starting kubelet.service... May 15 00:47:00.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:00.430580 kernel: audit: type=1130 audit(1747270020.421:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:00.430688 kernel: audit: type=1131 audit(1747270020.421:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:00.441165 systemd[1]: Reloading. May 15 00:47:00.596958 /usr/lib/systemd/system-generators/torcx-generator[1654]: time="2025-05-15T00:47:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:47:00.596984 /usr/lib/systemd/system-generators/torcx-generator[1654]: time="2025-05-15T00:47:00Z" level=info msg="torcx already run" May 15 00:47:01.281851 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:47:01.281865 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:47:01.298000 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:47:01.365464 kernel: audit: type=1400 audit(1747270021.353:244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.365611 kernel: audit: type=1400 audit(1747270021.353:245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.365638 kernel: audit: type=1400 audit(1747270021.353:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369828 kernel: audit: type=1400 audit(1747270021.353:247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.360000 audit: BPF prog-id=43 op=LOAD May 15 00:47:01.360000 audit: BPF prog-id=41 op=UNLOAD May 15 00:47:01.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.364000 audit: BPF prog-id=44 op=LOAD May 15 00:47:01.364000 audit: BPF prog-id=36 op=UNLOAD May 15 00:47:01.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit: BPF prog-id=45 op=LOAD May 15 00:47:01.368000 audit: BPF prog-id=27 op=UNLOAD May 15 00:47:01.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit: BPF prog-id=46 op=LOAD May 15 00:47:01.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.368000 audit: BPF prog-id=47 op=LOAD May 15 00:47:01.368000 audit: BPF prog-id=28 op=UNLOAD May 15 00:47:01.368000 audit: BPF prog-id=29 op=UNLOAD May 15 00:47:01.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit: BPF prog-id=48 op=LOAD May 15 00:47:01.369000 audit: BPF prog-id=30 op=UNLOAD May 15 00:47:01.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.370000 audit: BPF prog-id=49 op=LOAD May 15 00:47:01.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.370000 audit: BPF prog-id=50 op=LOAD May 15 00:47:01.370000 audit: BPF prog-id=31 op=UNLOAD May 15 00:47:01.370000 audit: BPF prog-id=32 op=UNLOAD May 15 00:47:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit: BPF prog-id=51 op=LOAD May 15 00:47:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.371000 audit: BPF prog-id=52 op=LOAD May 15 00:47:01.371000 audit: BPF prog-id=33 op=UNLOAD May 15 00:47:01.371000 audit: BPF prog-id=34 op=UNLOAD May 15 00:47:01.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.372000 audit: BPF prog-id=53 op=LOAD May 15 00:47:01.372000 audit: BPF prog-id=35 op=UNLOAD May 15 00:47:01.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit: BPF prog-id=54 op=LOAD May 15 00:47:01.374000 audit: BPF prog-id=38 op=UNLOAD May 15 00:47:01.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit: BPF prog-id=55 op=LOAD May 15 00:47:01.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit: BPF prog-id=56 op=LOAD May 15 00:47:01.375000 audit: BPF prog-id=39 op=UNLOAD May 15 00:47:01.375000 audit: BPF prog-id=40 op=UNLOAD May 15 00:47:01.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.375000 audit: BPF prog-id=57 op=LOAD May 15 00:47:01.375000 audit: BPF prog-id=37 op=UNLOAD May 15 00:47:01.386821 systemd[1]: Started kubelet.service. May 15 00:47:01.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:01.388285 systemd[1]: Stopping kubelet.service... May 15 00:47:01.388586 systemd[1]: kubelet.service: Deactivated successfully. May 15 00:47:01.388785 systemd[1]: Stopped kubelet.service. May 15 00:47:01.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:01.390402 systemd[1]: Starting kubelet.service... May 15 00:47:01.466011 systemd[1]: Started kubelet.service. May 15 00:47:01.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:01.522931 kubelet[1702]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:47:01.522931 kubelet[1702]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 00:47:01.522931 kubelet[1702]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:47:01.523950 kubelet[1702]: I0515 00:47:01.523900 1702 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 00:47:01.791532 kubelet[1702]: I0515 00:47:01.791492 1702 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 00:47:01.791532 kubelet[1702]: I0515 00:47:01.791521 1702 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 00:47:01.791738 kubelet[1702]: I0515 00:47:01.791720 1702 server.go:927] "Client rotation is on, will bootstrap in background" May 15 00:47:01.806462 kubelet[1702]: I0515 00:47:01.806412 1702 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 00:47:01.807179 kubelet[1702]: E0515 00:47:01.807150 1702 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.19:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:01.816460 kubelet[1702]: I0515 00:47:01.816424 1702 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 00:47:01.817447 kubelet[1702]: I0515 00:47:01.817413 1702 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 00:47:01.817615 kubelet[1702]: I0515 00:47:01.817446 1702 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 00:47:01.818042 kubelet[1702]: I0515 00:47:01.818025 1702 topology_manager.go:138] "Creating topology manager with none policy" May 15 00:47:01.818042 kubelet[1702]: I0515 00:47:01.818042 1702 container_manager_linux.go:301] "Creating device plugin manager" May 15 00:47:01.818172 kubelet[1702]: I0515 00:47:01.818158 1702 state_mem.go:36] "Initialized new in-memory state store" May 15 00:47:01.818823 kubelet[1702]: I0515 00:47:01.818807 1702 kubelet.go:400] "Attempting to sync node with API server" May 15 00:47:01.818823 kubelet[1702]: I0515 00:47:01.818822 1702 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 00:47:01.818885 kubelet[1702]: I0515 00:47:01.818838 1702 kubelet.go:312] "Adding apiserver pod source" May 15 00:47:01.818885 kubelet[1702]: I0515 00:47:01.818852 1702 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 00:47:01.819407 kubelet[1702]: W0515 00:47:01.819333 1702 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.19:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:01.819472 kubelet[1702]: E0515 00:47:01.819422 1702 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.19:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:01.819618 kubelet[1702]: W0515 00:47:01.819569 1702 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.19:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:01.819687 kubelet[1702]: E0515 00:47:01.819626 1702 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.19:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:01.822598 kubelet[1702]: I0515 00:47:01.822571 1702 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 00:47:01.825508 kubelet[1702]: I0515 00:47:01.825479 1702 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 00:47:01.825560 kubelet[1702]: W0515 00:47:01.825542 1702 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 00:47:01.826275 kubelet[1702]: I0515 00:47:01.826259 1702 server.go:1264] "Started kubelet" May 15 00:47:01.826395 kubelet[1702]: I0515 00:47:01.826367 1702 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 00:47:01.826749 kubelet[1702]: I0515 00:47:01.826696 1702 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 00:47:01.827325 kubelet[1702]: I0515 00:47:01.827307 1702 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 00:47:01.827000 audit[1702]: AVC avc: denied { mac_admin } for pid=1702 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.827000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:47:01.827000 audit[1702]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005bbe90 a1=c000d44510 a2=c0005bbe60 a3=25 items=0 ppid=1 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.827000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:47:01.827000 audit[1702]: AVC avc: denied { mac_admin } for pid=1702 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:01.827000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:47:01.827000 audit[1702]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d32300 a1=c000d44528 a2=c0005bbf20 a3=25 items=0 ppid=1 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.827000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:47:01.829436 kubelet[1702]: I0515 00:47:01.829040 1702 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 00:47:01.829436 kubelet[1702]: I0515 00:47:01.829076 1702 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 00:47:01.829436 kubelet[1702]: I0515 00:47:01.829136 1702 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 00:47:01.830198 kubelet[1702]: I0515 00:47:01.830177 1702 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 00:47:01.830515 kubelet[1702]: I0515 00:47:01.830496 1702 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 00:47:01.830556 kubelet[1702]: I0515 00:47:01.830545 1702 reconciler.go:26] "Reconciler: start to sync state" May 15 00:47:01.832000 audit[1714]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:01.832000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc7fe02dc0 a2=0 a3=7ffc7fe02dac items=0 ppid=1702 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.832000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 00:47:01.833000 audit[1715]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:01.833000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeddff5400 a2=0 a3=7ffeddff53ec items=0 ppid=1702 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.833000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 00:47:01.837389 kubelet[1702]: I0515 00:47:01.837370 1702 factory.go:221] Registration of the systemd container factory successfully May 15 00:47:01.837462 kubelet[1702]: I0515 00:47:01.837438 1702 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 00:47:01.837684 kubelet[1702]: I0515 00:47:01.837671 1702 server.go:455] "Adding debug handlers to kubelet server" May 15 00:47:01.837810 kubelet[1702]: E0515 00:47:01.837773 1702 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.19:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.19:6443: connect: connection refused" interval="200ms" May 15 00:47:01.838565 kubelet[1702]: W0515 00:47:01.837710 1702 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.19:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:01.838565 kubelet[1702]: E0515 00:47:01.838511 1702 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.19:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:01.838643 kubelet[1702]: E0515 00:47:01.838469 1702 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.19:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.19:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183f8cd3d1a3ffe7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 00:47:01.826215911 +0000 UTC m=+0.355374245,LastTimestamp:2025-05-15 00:47:01.826215911 +0000 UTC m=+0.355374245,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 00:47:01.839089 kubelet[1702]: I0515 00:47:01.839063 1702 factory.go:221] Registration of the containerd container factory successfully May 15 00:47:01.837000 audit[1717]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:01.837000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd7232fe60 a2=0 a3=7ffd7232fe4c items=0 ppid=1702 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:47:01.841045 kubelet[1702]: E0515 00:47:01.841017 1702 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 00:47:01.840000 audit[1719]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:01.840000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc43088e30 a2=0 a3=7ffc43088e1c items=0 ppid=1702 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:47:01.849000 audit[1724]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:01.849000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe36988e60 a2=0 a3=7ffe36988e4c items=0 ppid=1702 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 00:47:01.850786 kubelet[1702]: I0515 00:47:01.850723 1702 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 00:47:01.850000 audit[1728]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:01.850000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca1ff28b0 a2=0 a3=7ffca1ff289c items=0 ppid=1702 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.850000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 00:47:01.850000 audit[1727]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:01.850000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe3df79320 a2=0 a3=7ffe3df7930c items=0 ppid=1702 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 00:47:01.852414 kubelet[1702]: I0515 00:47:01.852388 1702 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 00:47:01.852451 kubelet[1702]: I0515 00:47:01.852426 1702 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 00:47:01.852488 kubelet[1702]: I0515 00:47:01.852451 1702 kubelet.go:2337] "Starting kubelet main sync loop" May 15 00:47:01.852540 kubelet[1702]: E0515 00:47:01.852497 1702 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 00:47:01.852931 kubelet[1702]: W0515 00:47:01.852903 1702 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.19:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:01.852931 kubelet[1702]: E0515 00:47:01.852943 1702 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.19:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:01.853822 kubelet[1702]: I0515 00:47:01.853806 1702 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 00:47:01.852000 audit[1731]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:01.852000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc53db4fe0 a2=0 a3=7ffc53db4fcc items=0 ppid=1702 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 00:47:01.854067 kubelet[1702]: I0515 00:47:01.853893 1702 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 00:47:01.854067 kubelet[1702]: I0515 00:47:01.853917 1702 state_mem.go:36] "Initialized new in-memory state store" May 15 00:47:01.853000 audit[1732]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:01.853000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6ade09a0 a2=0 a3=7ffc6ade098c items=0 ppid=1702 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 00:47:01.854000 audit[1734]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:01.854000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc94366800 a2=0 a3=7ffc943667ec items=0 ppid=1702 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.854000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 00:47:01.854000 audit[1733]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:01.854000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4f1c4ac0 a2=0 a3=7fff4f1c4aac items=0 ppid=1702 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.854000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 00:47:01.855000 audit[1735]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:01.855000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc04703ba0 a2=0 a3=7ffc04703b8c items=0 ppid=1702 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:01.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 00:47:01.931867 kubelet[1702]: I0515 00:47:01.931801 1702 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 00:47:01.932179 kubelet[1702]: E0515 00:47:01.932140 1702 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.19:6443/api/v1/nodes\": dial tcp 10.0.0.19:6443: connect: connection refused" node="localhost" May 15 00:47:01.953326 kubelet[1702]: E0515 00:47:01.953291 1702 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 00:47:02.038389 kubelet[1702]: E0515 00:47:02.038349 1702 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.19:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.19:6443: connect: connection refused" interval="400ms" May 15 00:47:02.051928 kubelet[1702]: I0515 00:47:02.051858 1702 policy_none.go:49] "None policy: Start" May 15 00:47:02.052649 kubelet[1702]: I0515 00:47:02.052635 1702 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 00:47:02.052743 kubelet[1702]: I0515 00:47:02.052728 1702 state_mem.go:35] "Initializing new in-memory state store" May 15 00:47:02.060154 systemd[1]: Created slice kubepods.slice. May 15 00:47:02.063317 systemd[1]: Created slice kubepods-burstable.slice. May 15 00:47:02.065351 systemd[1]: Created slice kubepods-besteffort.slice. May 15 00:47:02.070740 kubelet[1702]: I0515 00:47:02.070712 1702 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 00:47:02.069000 audit[1702]: AVC avc: denied { mac_admin } for pid=1702 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:02.069000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:47:02.069000 audit[1702]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000177f50 a1=c0010180a8 a2=c000177ef0 a3=25 items=0 ppid=1 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:02.069000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:47:02.071012 kubelet[1702]: I0515 00:47:02.070779 1702 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 00:47:02.071012 kubelet[1702]: I0515 00:47:02.070901 1702 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 00:47:02.071083 kubelet[1702]: I0515 00:47:02.071019 1702 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 00:47:02.071751 kubelet[1702]: E0515 00:47:02.071733 1702 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 00:47:02.134722 kubelet[1702]: I0515 00:47:02.134702 1702 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 00:47:02.134971 kubelet[1702]: E0515 00:47:02.134941 1702 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.19:6443/api/v1/nodes\": dial tcp 10.0.0.19:6443: connect: connection refused" node="localhost" May 15 00:47:02.154091 kubelet[1702]: I0515 00:47:02.154063 1702 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 15 00:47:02.154744 kubelet[1702]: I0515 00:47:02.154727 1702 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 15 00:47:02.155335 kubelet[1702]: I0515 00:47:02.155320 1702 topology_manager.go:215] "Topology Admit Handler" podUID="8ffbe26d635beaacc6be53e403f42bc0" podNamespace="kube-system" podName="kube-apiserver-localhost" May 15 00:47:02.159039 systemd[1]: Created slice kubepods-burstable-podb20b39a8540dba87b5883a6f0f602dba.slice. May 15 00:47:02.173073 systemd[1]: Created slice kubepods-burstable-pod8ffbe26d635beaacc6be53e403f42bc0.slice. May 15 00:47:02.185913 systemd[1]: Created slice kubepods-burstable-pod6ece95f10dbffa04b25ec3439a115512.slice. May 15 00:47:02.232365 kubelet[1702]: I0515 00:47:02.232339 1702 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:47:02.232495 kubelet[1702]: I0515 00:47:02.232476 1702 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:47:02.232567 kubelet[1702]: I0515 00:47:02.232506 1702 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:47:02.232567 kubelet[1702]: I0515 00:47:02.232538 1702 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8ffbe26d635beaacc6be53e403f42bc0-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"8ffbe26d635beaacc6be53e403f42bc0\") " pod="kube-system/kube-apiserver-localhost" May 15 00:47:02.232567 kubelet[1702]: I0515 00:47:02.232557 1702 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:47:02.232631 kubelet[1702]: I0515 00:47:02.232576 1702 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:47:02.232631 kubelet[1702]: I0515 00:47:02.232594 1702 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 15 00:47:02.232631 kubelet[1702]: I0515 00:47:02.232618 1702 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8ffbe26d635beaacc6be53e403f42bc0-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"8ffbe26d635beaacc6be53e403f42bc0\") " pod="kube-system/kube-apiserver-localhost" May 15 00:47:02.232695 kubelet[1702]: I0515 00:47:02.232641 1702 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8ffbe26d635beaacc6be53e403f42bc0-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"8ffbe26d635beaacc6be53e403f42bc0\") " pod="kube-system/kube-apiserver-localhost" May 15 00:47:02.438856 kubelet[1702]: E0515 00:47:02.438727 1702 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.19:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.19:6443: connect: connection refused" interval="800ms" May 15 00:47:02.471967 kubelet[1702]: E0515 00:47:02.471932 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:02.472554 env[1207]: time="2025-05-15T00:47:02.472512089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,}" May 15 00:47:02.484701 kubelet[1702]: E0515 00:47:02.484672 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:02.484950 env[1207]: time="2025-05-15T00:47:02.484912368Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:8ffbe26d635beaacc6be53e403f42bc0,Namespace:kube-system,Attempt:0,}" May 15 00:47:02.488147 kubelet[1702]: E0515 00:47:02.488123 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:02.488392 env[1207]: time="2025-05-15T00:47:02.488369495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,}" May 15 00:47:02.536583 kubelet[1702]: I0515 00:47:02.536554 1702 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 00:47:02.536823 kubelet[1702]: E0515 00:47:02.536802 1702 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.19:6443/api/v1/nodes\": dial tcp 10.0.0.19:6443: connect: connection refused" node="localhost" May 15 00:47:02.751109 kubelet[1702]: W0515 00:47:02.751043 1702 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.19:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:02.751220 kubelet[1702]: E0515 00:47:02.751117 1702 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.19:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:02.977163 kubelet[1702]: W0515 00:47:02.977107 1702 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.19:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:02.977163 kubelet[1702]: E0515 00:47:02.977167 1702 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.19:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:03.019744 kubelet[1702]: W0515 00:47:03.019625 1702 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.19:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:03.019744 kubelet[1702]: E0515 00:47:03.019687 1702 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.19:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:03.227208 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3960335347.mount: Deactivated successfully. May 15 00:47:03.232966 env[1207]: time="2025-05-15T00:47:03.232915201Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.233736 env[1207]: time="2025-05-15T00:47:03.233702168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.235445 env[1207]: time="2025-05-15T00:47:03.235424129Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.237260 env[1207]: time="2025-05-15T00:47:03.237209229Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.238926 env[1207]: time="2025-05-15T00:47:03.238899130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.239600 kubelet[1702]: E0515 00:47:03.239557 1702 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.19:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.19:6443: connect: connection refused" interval="1.6s" May 15 00:47:03.240114 env[1207]: time="2025-05-15T00:47:03.240068063Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.241514 env[1207]: time="2025-05-15T00:47:03.241491955Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.243369 env[1207]: time="2025-05-15T00:47:03.243346765Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.245200 env[1207]: time="2025-05-15T00:47:03.245172682Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.246430 env[1207]: time="2025-05-15T00:47:03.246404724Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.247708 env[1207]: time="2025-05-15T00:47:03.247681209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.248440 env[1207]: time="2025-05-15T00:47:03.248420576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:03.276654 env[1207]: time="2025-05-15T00:47:03.276483214Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:03.276654 env[1207]: time="2025-05-15T00:47:03.276534470Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:03.276654 env[1207]: time="2025-05-15T00:47:03.276548166Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:03.278695 env[1207]: time="2025-05-15T00:47:03.278546515Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8843e0612d2f8071a724fd2ab206afe25234c5173df6538d92eafbd41daa2ca6 pid=1743 runtime=io.containerd.runc.v2 May 15 00:47:03.279860 env[1207]: time="2025-05-15T00:47:03.279808994Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:03.279909 env[1207]: time="2025-05-15T00:47:03.279871481Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:03.279909 env[1207]: time="2025-05-15T00:47:03.279894815Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:03.280100 env[1207]: time="2025-05-15T00:47:03.280062931Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3dac78783f59d093d9ea83661755620100d153aa5a3d97c323c35a513c1817b5 pid=1759 runtime=io.containerd.runc.v2 May 15 00:47:03.317376 env[1207]: time="2025-05-15T00:47:03.315885379Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:03.317376 env[1207]: time="2025-05-15T00:47:03.315956963Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:03.317376 env[1207]: time="2025-05-15T00:47:03.315977091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:03.317376 env[1207]: time="2025-05-15T00:47:03.316100673Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55b8ed473168fdd107c7e361e57e94430652cf3964857e69f85878eae384ac47 pid=1783 runtime=io.containerd.runc.v2 May 15 00:47:03.325431 systemd[1]: Started cri-containerd-3dac78783f59d093d9ea83661755620100d153aa5a3d97c323c35a513c1817b5.scope. May 15 00:47:03.331757 systemd[1]: Started cri-containerd-8843e0612d2f8071a724fd2ab206afe25234c5173df6538d92eafbd41daa2ca6.scope. May 15 00:47:03.339160 systemd[1]: Started cri-containerd-55b8ed473168fdd107c7e361e57e94430652cf3964857e69f85878eae384ac47.scope. May 15 00:47:03.340298 kubelet[1702]: I0515 00:47:03.339847 1702 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 00:47:03.341464 kubelet[1702]: E0515 00:47:03.341410 1702 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.19:6443/api/v1/nodes\": dial tcp 10.0.0.19:6443: connect: connection refused" node="localhost" May 15 00:47:03.351175 kernel: kauditd_printk_skb: 219 callbacks suppressed May 15 00:47:03.351289 kernel: audit: type=1400 audit(1747270023.345:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.362345 kernel: audit: type=1400 audit(1747270023.345:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.362438 kernel: audit: type=1400 audit(1747270023.345:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.362454 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 00:47:03.362467 kernel: audit: type=1400 audit(1747270023.345:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.362495 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 15 00:47:03.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.366587 kernel: audit: type=1400 audit(1747270023.345:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.366619 kernel: audit: backlog limit exceeded May 15 00:47:03.366632 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 00:47:03.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.367277 kernel: audit: type=1400 audit(1747270023.345:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.349000 audit: BPF prog-id=58 op=LOAD May 15 00:47:03.350000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.350000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1759 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364616337383738336635396430393364396561383336363137353536 May 15 00:47:03.350000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.350000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1759 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364616337383738336635396430393364396561383336363137353536 May 15 00:47:03.350000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.350000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.350000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.350000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.350000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.350000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.350000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.350000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.350000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.353000 audit: BPF prog-id=59 op=LOAD May 15 00:47:03.350000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.350000 audit: BPF prog-id=60 op=LOAD May 15 00:47:03.350000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c4690 items=0 ppid=1759 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364616337383738336635396430393364396561383336363137353536 May 15 00:47:03.354000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1743 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343365303631326432663830373161373234666432616232303661 May 15 00:47:03.354000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1743 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343365303631326432663830373161373234666432616232303661 May 15 00:47:03.354000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit: BPF prog-id=61 op=LOAD May 15 00:47:03.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.354000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e9ad0 items=0 ppid=1743 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343365303631326432663830373161373234666432616232303661 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit: BPF prog-id=64 op=LOAD May 15 00:47:03.370000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e9b18 items=0 ppid=1743 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343365303631326432663830373161373234666432616232303661 May 15 00:47:03.370000 audit: BPF prog-id=64 op=UNLOAD May 15 00:47:03.370000 audit: BPF prog-id=62 op=UNLOAD May 15 00:47:03.370000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1783 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623865643437333136386664643130376337653336316535376539 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1783 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623865643437333136386664643130376337653336316535376539 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit: BPF prog-id=65 op=LOAD May 15 00:47:03.370000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002135d0 items=0 ppid=1783 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.370000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623865643437333136386664643130376337653336316535376539 May 15 00:47:03.370000 audit: BPF prog-id=66 op=LOAD May 15 00:47:03.370000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001e9f28 items=0 ppid=1743 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343365303631326432663830373161373234666432616232303661 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit: BPF prog-id=67 op=LOAD May 15 00:47:03.370000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000213618 items=0 ppid=1783 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623865643437333136386664643130376337653336316535376539 May 15 00:47:03.370000 audit: BPF prog-id=67 op=UNLOAD May 15 00:47:03.370000 audit: BPF prog-id=65 op=UNLOAD May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.370000 audit: BPF prog-id=68 op=LOAD May 15 00:47:03.370000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000213a28 items=0 ppid=1783 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623865643437333136386664643130376337653336316535376539 May 15 00:47:03.354000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c46d8 items=0 ppid=1759 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364616337383738336635396430393364396561383336363137353536 May 15 00:47:03.376000 audit: BPF prog-id=61 op=UNLOAD May 15 00:47:03.376000 audit: BPF prog-id=60 op=UNLOAD May 15 00:47:03.376000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.376000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.376000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.376000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.376000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.376000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.376000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.376000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.376000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.376000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.376000 audit: BPF prog-id=69 op=LOAD May 15 00:47:03.376000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c4ae8 items=0 ppid=1759 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364616337383738336635396430393364396561383336363137353536 May 15 00:47:03.396605 env[1207]: time="2025-05-15T00:47:03.396568054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:8ffbe26d635beaacc6be53e403f42bc0,Namespace:kube-system,Attempt:0,} returns sandbox id \"55b8ed473168fdd107c7e361e57e94430652cf3964857e69f85878eae384ac47\"" May 15 00:47:03.398032 kubelet[1702]: E0515 00:47:03.398013 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:03.401099 env[1207]: time="2025-05-15T00:47:03.401027232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,} returns sandbox id \"8843e0612d2f8071a724fd2ab206afe25234c5173df6538d92eafbd41daa2ca6\"" May 15 00:47:03.401396 env[1207]: time="2025-05-15T00:47:03.401377890Z" level=info msg="CreateContainer within sandbox \"55b8ed473168fdd107c7e361e57e94430652cf3964857e69f85878eae384ac47\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 00:47:03.402956 kubelet[1702]: E0515 00:47:03.402933 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:03.406372 env[1207]: time="2025-05-15T00:47:03.406345832Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,} returns sandbox id \"3dac78783f59d093d9ea83661755620100d153aa5a3d97c323c35a513c1817b5\"" May 15 00:47:03.406540 env[1207]: time="2025-05-15T00:47:03.406405844Z" level=info msg="CreateContainer within sandbox \"8843e0612d2f8071a724fd2ab206afe25234c5173df6538d92eafbd41daa2ca6\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 00:47:03.407093 kubelet[1702]: E0515 00:47:03.407063 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:03.408215 env[1207]: time="2025-05-15T00:47:03.408195983Z" level=info msg="CreateContainer within sandbox \"3dac78783f59d093d9ea83661755620100d153aa5a3d97c323c35a513c1817b5\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 00:47:03.409589 kubelet[1702]: W0515 00:47:03.409518 1702 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.19:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:03.409589 kubelet[1702]: E0515 00:47:03.409565 1702 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.19:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.19:6443: connect: connection refused May 15 00:47:03.423965 env[1207]: time="2025-05-15T00:47:03.423943132Z" level=info msg="CreateContainer within sandbox \"55b8ed473168fdd107c7e361e57e94430652cf3964857e69f85878eae384ac47\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"861c48168d48e504689488d50e860f7830908217f846476ca66445cafbb9ed95\"" May 15 00:47:03.424463 env[1207]: time="2025-05-15T00:47:03.424445354Z" level=info msg="StartContainer for \"861c48168d48e504689488d50e860f7830908217f846476ca66445cafbb9ed95\"" May 15 00:47:03.428522 env[1207]: time="2025-05-15T00:47:03.428479684Z" level=info msg="CreateContainer within sandbox \"8843e0612d2f8071a724fd2ab206afe25234c5173df6538d92eafbd41daa2ca6\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"0ed37109f8c4aa73969af24c81cad8a598dcd4c60e0c3364ad1f569677b70187\"" May 15 00:47:03.429038 env[1207]: time="2025-05-15T00:47:03.429008727Z" level=info msg="StartContainer for \"0ed37109f8c4aa73969af24c81cad8a598dcd4c60e0c3364ad1f569677b70187\"" May 15 00:47:03.431034 env[1207]: time="2025-05-15T00:47:03.430995775Z" level=info msg="CreateContainer within sandbox \"3dac78783f59d093d9ea83661755620100d153aa5a3d97c323c35a513c1817b5\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"85646ca013e8f7cb3a6aa23a44c4b9b2bf871a505aed83950bf7edb0a29fe0cc\"" May 15 00:47:03.431365 env[1207]: time="2025-05-15T00:47:03.431342286Z" level=info msg="StartContainer for \"85646ca013e8f7cb3a6aa23a44c4b9b2bf871a505aed83950bf7edb0a29fe0cc\"" May 15 00:47:03.438305 systemd[1]: Started cri-containerd-861c48168d48e504689488d50e860f7830908217f846476ca66445cafbb9ed95.scope. May 15 00:47:03.444666 systemd[1]: Started cri-containerd-0ed37109f8c4aa73969af24c81cad8a598dcd4c60e0c3364ad1f569677b70187.scope. May 15 00:47:03.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.450000 audit: BPF prog-id=70 op=LOAD May 15 00:47:03.451000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.451000 audit[1871]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1783 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836316334383136386434386535303436383934383864353065383630 May 15 00:47:03.451000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.451000 audit[1871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1783 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836316334383136386434386535303436383934383864353065383630 May 15 00:47:03.452000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.452000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.452000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.452000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.452000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.452000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.452000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.452000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.452000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.452000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.452000 audit: BPF prog-id=71 op=LOAD May 15 00:47:03.452000 audit[1871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021e930 items=0 ppid=1783 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836316334383136386434386535303436383934383864353065383630 May 15 00:47:03.453000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.453000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.453000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.453000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.453000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.453000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.453000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.453000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit: BPF prog-id=72 op=LOAD May 15 00:47:03.454000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1743 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065643337313039663863346161373339363961663234633831636164 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1743 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065643337313039663863346161373339363961663234633831636164 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit: BPF prog-id=73 op=LOAD May 15 00:47:03.454000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000231cb0 items=0 ppid=1743 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065643337313039663863346161373339363961663234633831636164 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.454000 audit: BPF prog-id=74 op=LOAD May 15 00:47:03.454000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000231cf8 items=0 ppid=1743 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065643337313039663863346161373339363961663234633831636164 May 15 00:47:03.454000 audit: BPF prog-id=74 op=UNLOAD May 15 00:47:03.454000 audit: BPF prog-id=73 op=UNLOAD May 15 00:47:03.455000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.453000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.453000 audit: BPF prog-id=75 op=LOAD May 15 00:47:03.453000 audit[1871]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021e978 items=0 ppid=1783 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836316334383136386434386535303436383934383864353065383630 May 15 00:47:03.455000 audit: BPF prog-id=75 op=UNLOAD May 15 00:47:03.455000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit: BPF prog-id=76 op=LOAD May 15 00:47:03.455000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00027c108 items=0 ppid=1743 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065643337313039663863346161373339363961663234633831636164 May 15 00:47:03.455000 audit: BPF prog-id=71 op=UNLOAD May 15 00:47:03.455000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1871]: AVC avc: denied { perfmon } for pid=1871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit[1871]: AVC avc: denied { bpf } for pid=1871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.455000 audit: BPF prog-id=77 op=LOAD May 15 00:47:03.455000 audit[1871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021ed88 items=0 ppid=1783 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836316334383136386434386535303436383934383864353065383630 May 15 00:47:03.458849 systemd[1]: Started cri-containerd-85646ca013e8f7cb3a6aa23a44c4b9b2bf871a505aed83950bf7edb0a29fe0cc.scope. May 15 00:47:03.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit: BPF prog-id=78 op=LOAD May 15 00:47:03.471000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1759 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835363436636130313365386637636233613661613233613434633462 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1759 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835363436636130313365386637636233613661613233613434633462 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit: BPF prog-id=79 op=LOAD May 15 00:47:03.471000 audit[1898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218b40 items=0 ppid=1759 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835363436636130313365386637636233613661613233613434633462 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.471000 audit: BPF prog-id=80 op=LOAD May 15 00:47:03.471000 audit[1898]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218b88 items=0 ppid=1759 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835363436636130313365386637636233613661613233613434633462 May 15 00:47:03.471000 audit: BPF prog-id=80 op=UNLOAD May 15 00:47:03.471000 audit: BPF prog-id=79 op=UNLOAD May 15 00:47:03.472000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.472000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.472000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.472000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.472000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.472000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.472000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.472000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.472000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.472000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:03.472000 audit: BPF prog-id=81 op=LOAD May 15 00:47:03.472000 audit[1898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218f98 items=0 ppid=1759 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:03.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835363436636130313365386637636233613661613233613434633462 May 15 00:47:03.488251 env[1207]: time="2025-05-15T00:47:03.488199895Z" level=info msg="StartContainer for \"0ed37109f8c4aa73969af24c81cad8a598dcd4c60e0c3364ad1f569677b70187\" returns successfully" May 15 00:47:03.493667 env[1207]: time="2025-05-15T00:47:03.493620476Z" level=info msg="StartContainer for \"861c48168d48e504689488d50e860f7830908217f846476ca66445cafbb9ed95\" returns successfully" May 15 00:47:03.503691 env[1207]: time="2025-05-15T00:47:03.503127515Z" level=info msg="StartContainer for \"85646ca013e8f7cb3a6aa23a44c4b9b2bf871a505aed83950bf7edb0a29fe0cc\" returns successfully" May 15 00:47:03.859072 kubelet[1702]: E0515 00:47:03.858964 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:03.860743 kubelet[1702]: E0515 00:47:03.860693 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:03.862111 kubelet[1702]: E0515 00:47:03.862049 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:04.263000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:04.263000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00120c020 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:47:04.263000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:47:04.263000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:04.263000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003a2900 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:47:04.263000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:47:04.824000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:04.824000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:04.824000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00837fe40 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:47:04.824000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:47:04.824000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c005ef0000 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:47:04.824000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:47:04.824000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:04.824000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00382e000 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:47:04.824000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:47:04.834000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:04.834000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c008dacfa0 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:47:04.834000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:47:04.834000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:04.834000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c005ef02a0 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:47:04.834000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:47:04.834000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:04.834000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c005ef0300 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:47:04.834000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:47:04.845272 kubelet[1702]: E0515 00:47:04.845198 1702 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 15 00:47:04.864924 kubelet[1702]: E0515 00:47:04.864760 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:04.865331 kubelet[1702]: E0515 00:47:04.865299 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:04.942967 kubelet[1702]: I0515 00:47:04.942926 1702 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 00:47:04.949568 kubelet[1702]: I0515 00:47:04.949531 1702 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 15 00:47:04.956083 kubelet[1702]: E0515 00:47:04.956049 1702 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:47:05.056754 kubelet[1702]: E0515 00:47:05.056696 1702 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:47:05.157767 kubelet[1702]: E0515 00:47:05.157648 1702 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:47:05.257973 kubelet[1702]: E0515 00:47:05.257929 1702 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:47:05.358845 kubelet[1702]: E0515 00:47:05.358803 1702 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:47:05.459371 kubelet[1702]: E0515 00:47:05.459287 1702 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:47:05.560140 kubelet[1702]: E0515 00:47:05.560081 1702 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:47:05.660809 kubelet[1702]: E0515 00:47:05.660746 1702 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:47:05.821179 kubelet[1702]: I0515 00:47:05.821129 1702 apiserver.go:52] "Watching apiserver" May 15 00:47:05.831650 kubelet[1702]: I0515 00:47:05.831613 1702 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 00:47:07.054609 kubelet[1702]: E0515 00:47:07.054559 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:07.867653 kubelet[1702]: E0515 00:47:07.867621 1702 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:07.906477 systemd[1]: Reloading. May 15 00:47:08.018726 /usr/lib/systemd/system-generators/torcx-generator[2008]: time="2025-05-15T00:47:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 00:47:08.018757 /usr/lib/systemd/system-generators/torcx-generator[2008]: time="2025-05-15T00:47:08Z" level=info msg="torcx already run" May 15 00:47:08.071730 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 00:47:08.071747 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 00:47:08.088829 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 00:47:08.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit: BPF prog-id=82 op=LOAD May 15 00:47:08.156000 audit: BPF prog-id=43 op=UNLOAD May 15 00:47:08.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.156000 audit: BPF prog-id=83 op=LOAD May 15 00:47:08.156000 audit: BPF prog-id=44 op=UNLOAD May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit: BPF prog-id=84 op=LOAD May 15 00:47:08.157000 audit: BPF prog-id=45 op=UNLOAD May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit: BPF prog-id=85 op=LOAD May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.157000 audit: BPF prog-id=86 op=LOAD May 15 00:47:08.157000 audit: BPF prog-id=46 op=UNLOAD May 15 00:47:08.157000 audit: BPF prog-id=47 op=UNLOAD May 15 00:47:08.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.158000 audit: BPF prog-id=87 op=LOAD May 15 00:47:08.158000 audit: BPF prog-id=58 op=UNLOAD May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit: BPF prog-id=88 op=LOAD May 15 00:47:08.159000 audit: BPF prog-id=48 op=UNLOAD May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit: BPF prog-id=89 op=LOAD May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.159000 audit: BPF prog-id=90 op=LOAD May 15 00:47:08.159000 audit: BPF prog-id=49 op=UNLOAD May 15 00:47:08.159000 audit: BPF prog-id=50 op=UNLOAD May 15 00:47:08.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.160000 audit: BPF prog-id=91 op=LOAD May 15 00:47:08.160000 audit: BPF prog-id=59 op=UNLOAD May 15 00:47:08.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.161000 audit: BPF prog-id=92 op=LOAD May 15 00:47:08.161000 audit: BPF prog-id=70 op=UNLOAD May 15 00:47:08.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit: BPF prog-id=93 op=LOAD May 15 00:47:08.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.162000 audit: BPF prog-id=94 op=LOAD May 15 00:47:08.162000 audit: BPF prog-id=51 op=UNLOAD May 15 00:47:08.162000 audit: BPF prog-id=52 op=UNLOAD May 15 00:47:08.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.163000 audit: BPF prog-id=95 op=LOAD May 15 00:47:08.163000 audit: BPF prog-id=53 op=UNLOAD May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit: BPF prog-id=96 op=LOAD May 15 00:47:08.165000 audit: BPF prog-id=54 op=UNLOAD May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit: BPF prog-id=97 op=LOAD May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit: BPF prog-id=98 op=LOAD May 15 00:47:08.165000 audit: BPF prog-id=55 op=UNLOAD May 15 00:47:08.165000 audit: BPF prog-id=56 op=UNLOAD May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.165000 audit: BPF prog-id=99 op=LOAD May 15 00:47:08.166000 audit: BPF prog-id=78 op=UNLOAD May 15 00:47:08.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit: BPF prog-id=100 op=LOAD May 15 00:47:08.167000 audit: BPF prog-id=57 op=UNLOAD May 15 00:47:08.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.167000 audit: BPF prog-id=101 op=LOAD May 15 00:47:08.167000 audit: BPF prog-id=72 op=UNLOAD May 15 00:47:08.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.168000 audit: BPF prog-id=102 op=LOAD May 15 00:47:08.168000 audit: BPF prog-id=63 op=UNLOAD May 15 00:47:08.178469 systemd[1]: Stopping kubelet.service... May 15 00:47:08.178983 kubelet[1702]: E0515 00:47:08.178375 1702 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{localhost.183f8cd3d1a3ffe7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 00:47:01.826215911 +0000 UTC m=+0.355374245,LastTimestamp:2025-05-15 00:47:01.826215911 +0000 UTC m=+0.355374245,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 00:47:08.204457 systemd[1]: kubelet.service: Deactivated successfully. May 15 00:47:08.204602 systemd[1]: Stopped kubelet.service. May 15 00:47:08.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:08.205939 systemd[1]: Starting kubelet.service... May 15 00:47:08.292401 systemd[1]: Started kubelet.service. May 15 00:47:08.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:08.341099 kubelet[2048]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:47:08.341461 kubelet[2048]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 00:47:08.341569 kubelet[2048]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 00:47:08.341721 kubelet[2048]: I0515 00:47:08.341585 2048 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 00:47:08.345476 kubelet[2048]: I0515 00:47:08.345444 2048 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 00:47:08.345476 kubelet[2048]: I0515 00:47:08.345470 2048 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 00:47:08.345694 kubelet[2048]: I0515 00:47:08.345674 2048 server.go:927] "Client rotation is on, will bootstrap in background" May 15 00:47:08.346824 kubelet[2048]: I0515 00:47:08.346805 2048 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 00:47:08.347861 kubelet[2048]: I0515 00:47:08.347826 2048 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 00:47:08.354271 kubelet[2048]: I0515 00:47:08.354216 2048 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 00:47:08.354459 kubelet[2048]: I0515 00:47:08.354422 2048 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 00:47:08.354625 kubelet[2048]: I0515 00:47:08.354451 2048 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 00:47:08.354709 kubelet[2048]: I0515 00:47:08.354631 2048 topology_manager.go:138] "Creating topology manager with none policy" May 15 00:47:08.354709 kubelet[2048]: I0515 00:47:08.354640 2048 container_manager_linux.go:301] "Creating device plugin manager" May 15 00:47:08.354709 kubelet[2048]: I0515 00:47:08.354671 2048 state_mem.go:36] "Initialized new in-memory state store" May 15 00:47:08.354788 kubelet[2048]: I0515 00:47:08.354753 2048 kubelet.go:400] "Attempting to sync node with API server" May 15 00:47:08.354788 kubelet[2048]: I0515 00:47:08.354764 2048 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 00:47:08.354788 kubelet[2048]: I0515 00:47:08.354782 2048 kubelet.go:312] "Adding apiserver pod source" May 15 00:47:08.354850 kubelet[2048]: I0515 00:47:08.354796 2048 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 00:47:08.355560 kubelet[2048]: I0515 00:47:08.355537 2048 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 00:47:08.355697 kubelet[2048]: I0515 00:47:08.355678 2048 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 00:47:08.356105 kubelet[2048]: I0515 00:47:08.356086 2048 server.go:1264] "Started kubelet" May 15 00:47:08.357829 kubelet[2048]: I0515 00:47:08.357798 2048 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 00:47:08.357829 kubelet[2048]: I0515 00:47:08.357839 2048 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 00:47:08.357955 kubelet[2048]: I0515 00:47:08.357861 2048 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 00:47:08.358954 kubelet[2048]: I0515 00:47:08.358796 2048 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 00:47:08.356000 audit[2048]: AVC avc: denied { mac_admin } for pid=2048 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.359597 kubelet[2048]: I0515 00:47:08.359585 2048 server.go:455] "Adding debug handlers to kubelet server" May 15 00:47:08.360211 kubelet[2048]: I0515 00:47:08.360103 2048 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 00:47:08.360211 kubelet[2048]: I0515 00:47:08.360201 2048 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 00:47:08.360432 kubelet[2048]: I0515 00:47:08.360286 2048 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 00:47:08.360432 kubelet[2048]: I0515 00:47:08.360304 2048 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 00:47:08.360432 kubelet[2048]: E0515 00:47:08.360326 2048 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 00:47:08.360432 kubelet[2048]: I0515 00:47:08.360397 2048 reconciler.go:26] "Reconciler: start to sync state" May 15 00:47:08.361592 kubelet[2048]: I0515 00:47:08.361575 2048 factory.go:221] Registration of the systemd container factory successfully May 15 00:47:08.361660 kubelet[2048]: I0515 00:47:08.361643 2048 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 00:47:08.362434 kubelet[2048]: I0515 00:47:08.362408 2048 factory.go:221] Registration of the containerd container factory successfully May 15 00:47:08.363084 kernel: kauditd_printk_skb: 624 callbacks suppressed May 15 00:47:08.363131 kernel: audit: type=1400 audit(1747270028.356:787): avc: denied { mac_admin } for pid=2048 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.363152 kernel: audit: type=1401 audit(1747270028.356:787): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:47:08.356000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:47:08.366463 kubelet[2048]: E0515 00:47:08.366284 2048 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 00:47:08.356000 audit[2048]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000736930 a1=c000864810 a2=c000736900 a3=25 items=0 ppid=1 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:08.377064 kernel: audit: type=1300 audit(1747270028.356:787): arch=c000003e syscall=188 success=no exit=-22 a0=c000736930 a1=c000864810 a2=c000736900 a3=25 items=0 ppid=1 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:08.377157 kernel: audit: type=1327 audit(1747270028.356:787): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:47:08.356000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:47:08.356000 audit[2048]: AVC avc: denied { mac_admin } for pid=2048 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.382279 kernel: audit: type=1400 audit(1747270028.356:788): avc: denied { mac_admin } for pid=2048 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.382318 kernel: audit: type=1401 audit(1747270028.356:788): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:47:08.356000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:47:08.356000 audit[2048]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007d6940 a1=c000864828 a2=c0007369c0 a3=25 items=0 ppid=1 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:08.387086 kernel: audit: type=1300 audit(1747270028.356:788): arch=c000003e syscall=188 success=no exit=-22 a0=c0007d6940 a1=c000864828 a2=c0007369c0 a3=25 items=0 ppid=1 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:08.356000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:47:08.388646 kubelet[2048]: I0515 00:47:08.388607 2048 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 00:47:08.390212 kubelet[2048]: I0515 00:47:08.390150 2048 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 00:47:08.390280 kubelet[2048]: I0515 00:47:08.390216 2048 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 00:47:08.390280 kubelet[2048]: I0515 00:47:08.390232 2048 kubelet.go:2337] "Starting kubelet main sync loop" May 15 00:47:08.390372 kubelet[2048]: E0515 00:47:08.390316 2048 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 00:47:08.391183 kernel: audit: type=1327 audit(1747270028.356:788): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:47:08.405259 kubelet[2048]: I0515 00:47:08.405228 2048 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 00:47:08.405259 kubelet[2048]: I0515 00:47:08.405263 2048 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 00:47:08.405415 kubelet[2048]: I0515 00:47:08.405278 2048 state_mem.go:36] "Initialized new in-memory state store" May 15 00:47:08.405415 kubelet[2048]: I0515 00:47:08.405402 2048 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 00:47:08.405457 kubelet[2048]: I0515 00:47:08.405410 2048 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 00:47:08.405457 kubelet[2048]: I0515 00:47:08.405427 2048 policy_none.go:49] "None policy: Start" May 15 00:47:08.405929 kubelet[2048]: I0515 00:47:08.405913 2048 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 00:47:08.405984 kubelet[2048]: I0515 00:47:08.405936 2048 state_mem.go:35] "Initializing new in-memory state store" May 15 00:47:08.406132 kubelet[2048]: I0515 00:47:08.406110 2048 state_mem.go:75] "Updated machine memory state" May 15 00:47:08.408000 audit[2048]: AVC avc: denied { mac_admin } for pid=2048 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.409679 kubelet[2048]: I0515 00:47:08.409528 2048 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 00:47:08.409679 kubelet[2048]: I0515 00:47:08.409578 2048 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 00:47:08.410483 kubelet[2048]: I0515 00:47:08.410444 2048 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 00:47:08.410596 kubelet[2048]: I0515 00:47:08.410583 2048 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 00:47:08.416662 kernel: audit: type=1400 audit(1747270028.408:789): avc: denied { mac_admin } for pid=2048 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:08.416732 kernel: audit: type=1401 audit(1747270028.408:789): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:47:08.408000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 00:47:08.408000 audit[2048]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00039cf00 a1=c000d59f38 a2=c00039ced0 a3=25 items=0 ppid=1 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:08.408000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 00:47:08.464028 kubelet[2048]: I0515 00:47:08.463979 2048 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 00:47:08.470490 kubelet[2048]: I0515 00:47:08.470468 2048 kubelet_node_status.go:112] "Node was previously registered" node="localhost" May 15 00:47:08.470615 kubelet[2048]: I0515 00:47:08.470562 2048 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 15 00:47:08.490915 kubelet[2048]: I0515 00:47:08.490861 2048 topology_manager.go:215] "Topology Admit Handler" podUID="8ffbe26d635beaacc6be53e403f42bc0" podNamespace="kube-system" podName="kube-apiserver-localhost" May 15 00:47:08.491018 kubelet[2048]: I0515 00:47:08.490959 2048 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 15 00:47:08.491060 kubelet[2048]: I0515 00:47:08.491020 2048 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 15 00:47:08.497793 kubelet[2048]: E0515 00:47:08.497757 2048 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 00:47:08.561360 kubelet[2048]: I0515 00:47:08.561296 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:47:08.561360 kubelet[2048]: I0515 00:47:08.561330 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:47:08.561360 kubelet[2048]: I0515 00:47:08.561348 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8ffbe26d635beaacc6be53e403f42bc0-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"8ffbe26d635beaacc6be53e403f42bc0\") " pod="kube-system/kube-apiserver-localhost" May 15 00:47:08.561360 kubelet[2048]: I0515 00:47:08.561364 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8ffbe26d635beaacc6be53e403f42bc0-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"8ffbe26d635beaacc6be53e403f42bc0\") " pod="kube-system/kube-apiserver-localhost" May 15 00:47:08.561360 kubelet[2048]: I0515 00:47:08.561376 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8ffbe26d635beaacc6be53e403f42bc0-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"8ffbe26d635beaacc6be53e403f42bc0\") " pod="kube-system/kube-apiserver-localhost" May 15 00:47:08.561698 kubelet[2048]: I0515 00:47:08.561388 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:47:08.561698 kubelet[2048]: I0515 00:47:08.561401 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:47:08.561698 kubelet[2048]: I0515 00:47:08.561436 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 00:47:08.561698 kubelet[2048]: I0515 00:47:08.561449 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 15 00:47:08.799310 kubelet[2048]: E0515 00:47:08.799284 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:08.799523 kubelet[2048]: E0515 00:47:08.799284 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:08.799627 kubelet[2048]: E0515 00:47:08.799322 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:09.356018 kubelet[2048]: I0515 00:47:09.355962 2048 apiserver.go:52] "Watching apiserver" May 15 00:47:09.361349 kubelet[2048]: I0515 00:47:09.361312 2048 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 00:47:09.399048 kubelet[2048]: E0515 00:47:09.399012 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:09.403742 kubelet[2048]: E0515 00:47:09.403700 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:09.560107 kubelet[2048]: E0515 00:47:09.560054 2048 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 00:47:09.560448 kubelet[2048]: E0515 00:47:09.560430 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:09.631800 kubelet[2048]: I0515 00:47:09.631664 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.631553002 podStartE2EDuration="2.631553002s" podCreationTimestamp="2025-05-15 00:47:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:47:09.559948576 +0000 UTC m=+1.264292203" watchObservedRunningTime="2025-05-15 00:47:09.631553002 +0000 UTC m=+1.335896629" May 15 00:47:09.641298 kubelet[2048]: I0515 00:47:09.641220 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.641198594 podStartE2EDuration="1.641198594s" podCreationTimestamp="2025-05-15 00:47:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:47:09.631909286 +0000 UTC m=+1.336252913" watchObservedRunningTime="2025-05-15 00:47:09.641198594 +0000 UTC m=+1.345542221" May 15 00:47:09.652104 kubelet[2048]: I0515 00:47:09.652039 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.6520175259999998 podStartE2EDuration="1.652017526s" podCreationTimestamp="2025-05-15 00:47:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:47:09.641511103 +0000 UTC m=+1.345854730" watchObservedRunningTime="2025-05-15 00:47:09.652017526 +0000 UTC m=+1.356361143" May 15 00:47:10.400572 kubelet[2048]: E0515 00:47:10.400534 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:10.401087 kubelet[2048]: E0515 00:47:10.401063 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:13.115262 sudo[1342]: pam_unix(sudo:session): session closed for user root May 15 00:47:13.114000 audit[1342]: USER_END pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:47:13.114000 audit[1342]: CRED_DISP pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 00:47:13.329665 sshd[1338]: pam_unix(sshd:session): session closed for user core May 15 00:47:13.329000 audit[1338]: USER_END pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:13.329000 audit[1338]: CRED_DISP pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:13.332365 systemd[1]: sshd@6-10.0.0.19:22-10.0.0.1:60234.service: Deactivated successfully. May 15 00:47:13.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:60234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:13.333078 systemd[1]: session-7.scope: Deactivated successfully. May 15 00:47:13.333206 systemd[1]: session-7.scope: Consumed 4.826s CPU time. May 15 00:47:13.333585 systemd-logind[1191]: Session 7 logged out. Waiting for processes to exit. May 15 00:47:13.334251 systemd-logind[1191]: Removed session 7. May 15 00:47:14.282323 kubelet[2048]: E0515 00:47:14.282275 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:14.407711 kubelet[2048]: E0515 00:47:14.407665 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:14.996262 kubelet[2048]: E0515 00:47:14.996214 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:15.409228 kubelet[2048]: E0515 00:47:15.409107 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:18.428000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:18.431835 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 00:47:18.431974 kernel: audit: type=1400 audit(1747270038.428:795): avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:18.428000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000375e20 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:47:18.441562 kernel: audit: type=1300 audit(1747270038.428:795): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000375e20 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:47:18.441608 kernel: audit: type=1327 audit(1747270038.428:795): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:47:18.428000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:47:18.429000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:18.451714 kernel: audit: type=1400 audit(1747270038.429:796): avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:18.451755 kernel: audit: type=1300 audit(1747270038.429:796): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0004c3240 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:47:18.429000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0004c3240 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:47:18.429000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:47:18.461911 kernel: audit: type=1327 audit(1747270038.429:796): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:47:18.461955 kernel: audit: type=1400 audit(1747270038.429:797): avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:18.429000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:18.465622 kernel: audit: type=1300 audit(1747270038.429:797): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004c3b60 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:47:18.429000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004c3b60 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:47:18.429000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:47:18.474846 kernel: audit: type=1327 audit(1747270038.429:797): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:47:18.474901 kernel: audit: type=1400 audit(1747270038.429:798): avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:18.429000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:47:18.429000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00052de00 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:47:18.429000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:47:19.417149 kubelet[2048]: E0515 00:47:19.417115 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:19.725000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 00:47:19.725000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00076ed00 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:47:19.725000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:47:20.903685 update_engine[1193]: I0515 00:47:20.903625 1193 update_attempter.cc:509] Updating boot flags... May 15 00:47:21.733036 kubelet[2048]: I0515 00:47:21.732983 2048 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 00:47:21.733669 env[1207]: time="2025-05-15T00:47:21.733615828Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 00:47:21.734033 kubelet[2048]: I0515 00:47:21.733777 2048 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 00:47:22.690848 kubelet[2048]: I0515 00:47:22.690797 2048 topology_manager.go:215] "Topology Admit Handler" podUID="900941aa-b8cc-445b-be36-1a0f36e40f78" podNamespace="kube-system" podName="kube-proxy-7d2l7" May 15 00:47:22.693145 kubelet[2048]: W0515 00:47:22.693110 2048 reflector.go:547] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object May 15 00:47:22.693252 kubelet[2048]: E0515 00:47:22.693159 2048 reflector.go:150] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object May 15 00:47:22.693382 kubelet[2048]: W0515 00:47:22.693361 2048 reflector.go:547] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object May 15 00:47:22.693437 kubelet[2048]: E0515 00:47:22.693392 2048 reflector.go:150] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'localhost' and this object May 15 00:47:22.696393 systemd[1]: Created slice kubepods-besteffort-pod900941aa_b8cc_445b_be36_1a0f36e40f78.slice. May 15 00:47:22.757939 kubelet[2048]: I0515 00:47:22.757892 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vmln4\" (UniqueName: \"kubernetes.io/projected/900941aa-b8cc-445b-be36-1a0f36e40f78-kube-api-access-vmln4\") pod \"kube-proxy-7d2l7\" (UID: \"900941aa-b8cc-445b-be36-1a0f36e40f78\") " pod="kube-system/kube-proxy-7d2l7" May 15 00:47:22.757939 kubelet[2048]: I0515 00:47:22.757930 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/900941aa-b8cc-445b-be36-1a0f36e40f78-kube-proxy\") pod \"kube-proxy-7d2l7\" (UID: \"900941aa-b8cc-445b-be36-1a0f36e40f78\") " pod="kube-system/kube-proxy-7d2l7" May 15 00:47:22.757939 kubelet[2048]: I0515 00:47:22.757951 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/900941aa-b8cc-445b-be36-1a0f36e40f78-xtables-lock\") pod \"kube-proxy-7d2l7\" (UID: \"900941aa-b8cc-445b-be36-1a0f36e40f78\") " pod="kube-system/kube-proxy-7d2l7" May 15 00:47:22.758549 kubelet[2048]: I0515 00:47:22.757964 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/900941aa-b8cc-445b-be36-1a0f36e40f78-lib-modules\") pod \"kube-proxy-7d2l7\" (UID: \"900941aa-b8cc-445b-be36-1a0f36e40f78\") " pod="kube-system/kube-proxy-7d2l7" May 15 00:47:22.803564 kubelet[2048]: I0515 00:47:22.803520 2048 topology_manager.go:215] "Topology Admit Handler" podUID="d2fbd38c-c595-48be-82fd-f12b03401d9e" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-9927c" May 15 00:47:22.805647 kubelet[2048]: W0515 00:47:22.805433 2048 reflector.go:547] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object May 15 00:47:22.805647 kubelet[2048]: E0515 00:47:22.805653 2048 reflector.go:150] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object May 15 00:47:22.805859 kubelet[2048]: W0515 00:47:22.805740 2048 reflector.go:547] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object May 15 00:47:22.805859 kubelet[2048]: E0515 00:47:22.805750 2048 reflector.go:150] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object May 15 00:47:22.809159 systemd[1]: Created slice kubepods-besteffort-podd2fbd38c_c595_48be_82fd_f12b03401d9e.slice. May 15 00:47:22.859028 kubelet[2048]: I0515 00:47:22.858980 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-56v45\" (UniqueName: \"kubernetes.io/projected/d2fbd38c-c595-48be-82fd-f12b03401d9e-kube-api-access-56v45\") pod \"tigera-operator-797db67f8-9927c\" (UID: \"d2fbd38c-c595-48be-82fd-f12b03401d9e\") " pod="tigera-operator/tigera-operator-797db67f8-9927c" May 15 00:47:22.859028 kubelet[2048]: I0515 00:47:22.859025 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d2fbd38c-c595-48be-82fd-f12b03401d9e-var-lib-calico\") pod \"tigera-operator-797db67f8-9927c\" (UID: \"d2fbd38c-c595-48be-82fd-f12b03401d9e\") " pod="tigera-operator/tigera-operator-797db67f8-9927c" May 15 00:47:23.859329 kubelet[2048]: E0515 00:47:23.859279 2048 configmap.go:199] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition May 15 00:47:23.859687 kubelet[2048]: E0515 00:47:23.859387 2048 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/900941aa-b8cc-445b-be36-1a0f36e40f78-kube-proxy podName:900941aa-b8cc-445b-be36-1a0f36e40f78 nodeName:}" failed. No retries permitted until 2025-05-15 00:47:24.359363053 +0000 UTC m=+16.063706681 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-proxy" (UniqueName: "kubernetes.io/configmap/900941aa-b8cc-445b-be36-1a0f36e40f78-kube-proxy") pod "kube-proxy-7d2l7" (UID: "900941aa-b8cc-445b-be36-1a0f36e40f78") : failed to sync configmap cache: timed out waiting for the condition May 15 00:47:24.012574 env[1207]: time="2025-05-15T00:47:24.012513995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-9927c,Uid:d2fbd38c-c595-48be-82fd-f12b03401d9e,Namespace:tigera-operator,Attempt:0,}" May 15 00:47:24.029930 env[1207]: time="2025-05-15T00:47:24.029846954Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:24.029930 env[1207]: time="2025-05-15T00:47:24.029914973Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:24.030126 env[1207]: time="2025-05-15T00:47:24.029950370Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:24.030165 env[1207]: time="2025-05-15T00:47:24.030129990Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cfdce373c342498d6441abbb19705a567b02205d2f6306e9bdd23b15e8c485b8 pid=2157 runtime=io.containerd.runc.v2 May 15 00:47:24.043780 systemd[1]: Started cri-containerd-cfdce373c342498d6441abbb19705a567b02205d2f6306e9bdd23b15e8c485b8.scope. May 15 00:47:24.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.054402 kernel: kauditd_printk_skb: 5 callbacks suppressed May 15 00:47:24.054447 kernel: audit: type=1400 audit(1747270044.052:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.061193 kernel: audit: type=1400 audit(1747270044.052:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.061255 kernel: audit: type=1400 audit(1747270044.052:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.068102 kernel: audit: type=1400 audit(1747270044.052:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.068164 kernel: audit: type=1400 audit(1747270044.052:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.074464 kernel: audit: type=1400 audit(1747270044.052:805): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.074525 kernel: audit: type=1400 audit(1747270044.052:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.080412 kernel: audit: type=1400 audit(1747270044.052:807): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.080465 kernel: audit: type=1400 audit(1747270044.052:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.086142 kernel: audit: type=1400 audit(1747270044.056:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.056000 audit: BPF prog-id=103 op=LOAD May 15 00:47:24.056000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.056000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2157 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646365333733633334323439386436343431616262623139373035 May 15 00:47:24.057000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.057000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2157 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646365333733633334323439386436343431616262623139373035 May 15 00:47:24.057000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.057000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.057000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.057000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.057000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.057000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.057000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.057000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.057000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.057000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.057000 audit: BPF prog-id=104 op=LOAD May 15 00:47:24.057000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000269ce0 items=0 ppid=2157 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646365333733633334323439386436343431616262623139373035 May 15 00:47:24.063000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.063000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.063000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.063000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.063000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.063000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.063000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.063000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.063000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.063000 audit: BPF prog-id=105 op=LOAD May 15 00:47:24.063000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000269d28 items=0 ppid=2157 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646365333733633334323439386436343431616262623139373035 May 15 00:47:24.070000 audit: BPF prog-id=105 op=UNLOAD May 15 00:47:24.070000 audit: BPF prog-id=104 op=UNLOAD May 15 00:47:24.070000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.070000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.070000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.070000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.070000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.070000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.070000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.070000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.070000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.070000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.070000 audit: BPF prog-id=106 op=LOAD May 15 00:47:24.070000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00036c138 items=0 ppid=2157 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646365333733633334323439386436343431616262623139373035 May 15 00:47:24.105955 env[1207]: time="2025-05-15T00:47:24.105901720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-9927c,Uid:d2fbd38c-c595-48be-82fd-f12b03401d9e,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"cfdce373c342498d6441abbb19705a567b02205d2f6306e9bdd23b15e8c485b8\"" May 15 00:47:24.107911 env[1207]: time="2025-05-15T00:47:24.107879642Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 00:47:24.503072 kubelet[2048]: E0515 00:47:24.503002 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:24.503477 env[1207]: time="2025-05-15T00:47:24.503437532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7d2l7,Uid:900941aa-b8cc-445b-be36-1a0f36e40f78,Namespace:kube-system,Attempt:0,}" May 15 00:47:24.507855 systemd[1]: run-containerd-runc-k8s.io-cfdce373c342498d6441abbb19705a567b02205d2f6306e9bdd23b15e8c485b8-runc.dBYIo6.mount: Deactivated successfully. May 15 00:47:24.518581 env[1207]: time="2025-05-15T00:47:24.518516886Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:24.518581 env[1207]: time="2025-05-15T00:47:24.518559266Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:24.518581 env[1207]: time="2025-05-15T00:47:24.518572392Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:24.518740 env[1207]: time="2025-05-15T00:47:24.518703159Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d8eb1c749fe588eb729826909d50777604b2bf60f543759790fdec6ffd3ca0a8 pid=2197 runtime=io.containerd.runc.v2 May 15 00:47:24.532461 systemd[1]: Started cri-containerd-d8eb1c749fe588eb729826909d50777604b2bf60f543759790fdec6ffd3ca0a8.scope. May 15 00:47:24.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit: BPF prog-id=107 op=LOAD May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2197 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438656231633734396665353838656237323938323639303964353037 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2197 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438656231633734396665353838656237323938323639303964353037 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit: BPF prog-id=108 op=LOAD May 15 00:47:24.539000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000265c10 items=0 ppid=2197 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438656231633734396665353838656237323938323639303964353037 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit: BPF prog-id=109 op=LOAD May 15 00:47:24.539000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000265c58 items=0 ppid=2197 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438656231633734396665353838656237323938323639303964353037 May 15 00:47:24.539000 audit: BPF prog-id=109 op=UNLOAD May 15 00:47:24.539000 audit: BPF prog-id=108 op=UNLOAD May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.539000 audit: BPF prog-id=110 op=LOAD May 15 00:47:24.539000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000340068 items=0 ppid=2197 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438656231633734396665353838656237323938323639303964353037 May 15 00:47:24.549706 env[1207]: time="2025-05-15T00:47:24.549671810Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7d2l7,Uid:900941aa-b8cc-445b-be36-1a0f36e40f78,Namespace:kube-system,Attempt:0,} returns sandbox id \"d8eb1c749fe588eb729826909d50777604b2bf60f543759790fdec6ffd3ca0a8\"" May 15 00:47:24.550338 kubelet[2048]: E0515 00:47:24.550304 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:24.552287 env[1207]: time="2025-05-15T00:47:24.552261550Z" level=info msg="CreateContainer within sandbox \"d8eb1c749fe588eb729826909d50777604b2bf60f543759790fdec6ffd3ca0a8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 00:47:24.850153 env[1207]: time="2025-05-15T00:47:24.850013054Z" level=info msg="CreateContainer within sandbox \"d8eb1c749fe588eb729826909d50777604b2bf60f543759790fdec6ffd3ca0a8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"6cba355e8b6db17adf159f8a588132fa65b233ac78b409259806848ded918fa9\"" May 15 00:47:24.850824 env[1207]: time="2025-05-15T00:47:24.850760739Z" level=info msg="StartContainer for \"6cba355e8b6db17adf159f8a588132fa65b233ac78b409259806848ded918fa9\"" May 15 00:47:24.864674 systemd[1]: Started cri-containerd-6cba355e8b6db17adf159f8a588132fa65b233ac78b409259806848ded918fa9.scope. May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd5c9a41b18 items=0 ppid=2197 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626133353565386236646231376164663135396638613538383133 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit: BPF prog-id=111 op=LOAD May 15 00:47:24.877000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000326758 items=0 ppid=2197 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626133353565386236646231376164663135396638613538383133 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit: BPF prog-id=112 op=LOAD May 15 00:47:24.877000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003267a8 items=0 ppid=2197 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626133353565386236646231376164663135396638613538383133 May 15 00:47:24.877000 audit: BPF prog-id=112 op=UNLOAD May 15 00:47:24.877000 audit: BPF prog-id=111 op=UNLOAD May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:24.877000 audit: BPF prog-id=113 op=LOAD May 15 00:47:24.877000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000326838 items=0 ppid=2197 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626133353565386236646231376164663135396638613538383133 May 15 00:47:24.890020 env[1207]: time="2025-05-15T00:47:24.889968249Z" level=info msg="StartContainer for \"6cba355e8b6db17adf159f8a588132fa65b233ac78b409259806848ded918fa9\" returns successfully" May 15 00:47:24.940000 audit[2290]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:24.940000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff20cd6560 a2=0 a3=7fff20cd654c items=0 ppid=2247 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 00:47:24.940000 audit[2291]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:24.940000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9168c350 a2=0 a3=7ffc9168c33c items=0 ppid=2247 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 00:47:24.942000 audit[2292]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:24.942000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaa9cfdb0 a2=0 a3=7ffeaa9cfd9c items=0 ppid=2247 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.942000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 00:47:24.943000 audit[2293]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:24.943000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8c517250 a2=0 a3=7ffe8c51723c items=0 ppid=2247 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 00:47:24.944000 audit[2295]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:24.944000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd17db9990 a2=0 a3=7ffd17db997c items=0 ppid=2247 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.944000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 00:47:24.944000 audit[2296]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:24.944000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2792f580 a2=0 a3=7ffe2792f56c items=0 ppid=2247 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:24.944000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 00:47:25.044000 audit[2297]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.044000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffda9c5e830 a2=0 a3=7ffda9c5e81c items=0 ppid=2247 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 00:47:25.047000 audit[2299]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.047000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffce0c04120 a2=0 a3=7ffce0c0410c items=0 ppid=2247 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 00:47:25.049000 audit[2302]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.049000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe5afc7c70 a2=0 a3=7ffe5afc7c5c items=0 ppid=2247 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 00:47:25.050000 audit[2303]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.050000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd92aea560 a2=0 a3=7ffd92aea54c items=0 ppid=2247 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 00:47:25.052000 audit[2305]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.052000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdef80d9f0 a2=0 a3=7ffdef80d9dc items=0 ppid=2247 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.052000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 00:47:25.053000 audit[2306]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.053000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe67331e20 a2=0 a3=7ffe67331e0c items=0 ppid=2247 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 00:47:25.055000 audit[2308]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.055000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd04b723f0 a2=0 a3=7ffd04b723dc items=0 ppid=2247 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.055000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 00:47:25.058000 audit[2311]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.058000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe4ac164a0 a2=0 a3=7ffe4ac1648c items=0 ppid=2247 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 00:47:25.060000 audit[2312]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.060000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceb0c4190 a2=0 a3=7ffceb0c417c items=0 ppid=2247 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 00:47:25.062000 audit[2314]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.062000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff33a51850 a2=0 a3=7fff33a5183c items=0 ppid=2247 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 00:47:25.063000 audit[2315]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.063000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe18f4a30 a2=0 a3=7fffe18f4a1c items=0 ppid=2247 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.063000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 00:47:25.066000 audit[2317]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.066000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff3bf89c0 a2=0 a3=7ffff3bf89ac items=0 ppid=2247 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:47:25.069000 audit[2320]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.069000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9e1c4240 a2=0 a3=7ffd9e1c422c items=0 ppid=2247 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:47:25.072000 audit[2323]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.072000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd408b22b0 a2=0 a3=7ffd408b229c items=0 ppid=2247 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 00:47:25.073000 audit[2324]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.073000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff590805f0 a2=0 a3=7fff590805dc items=0 ppid=2247 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 00:47:25.075000 audit[2326]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.075000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc83bea9e0 a2=0 a3=7ffc83bea9cc items=0 ppid=2247 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:47:25.077000 audit[2329]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.077000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea01a39e0 a2=0 a3=7ffea01a39cc items=0 ppid=2247 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:47:25.078000 audit[2330]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.078000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeabf08e20 a2=0 a3=7ffeabf08e0c items=0 ppid=2247 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 00:47:25.080000 audit[2332]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 00:47:25.080000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc0b1b0310 a2=0 a3=7ffc0b1b02fc items=0 ppid=2247 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 00:47:25.100000 audit[2338]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:25.100000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffcdc3c1900 a2=0 a3=7ffcdc3c18ec items=0 ppid=2247 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.100000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:25.110000 audit[2338]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:25.110000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcdc3c1900 a2=0 a3=7ffcdc3c18ec items=0 ppid=2247 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.110000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:25.112000 audit[2343]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.112000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc53a5b620 a2=0 a3=7ffc53a5b60c items=0 ppid=2247 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.112000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 00:47:25.114000 audit[2345]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.114000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff982a1c80 a2=0 a3=7fff982a1c6c items=0 ppid=2247 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 00:47:25.117000 audit[2348]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.117000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd91eae590 a2=0 a3=7ffd91eae57c items=0 ppid=2247 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 00:47:25.118000 audit[2349]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.118000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe89c9d650 a2=0 a3=7ffe89c9d63c items=0 ppid=2247 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 00:47:25.120000 audit[2351]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.120000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff45cdcc20 a2=0 a3=7fff45cdcc0c items=0 ppid=2247 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 00:47:25.121000 audit[2352]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.121000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc64f5a520 a2=0 a3=7ffc64f5a50c items=0 ppid=2247 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 00:47:25.123000 audit[2354]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.123000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcb6eba650 a2=0 a3=7ffcb6eba63c items=0 ppid=2247 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 00:47:25.126000 audit[2357]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.126000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdd4314850 a2=0 a3=7ffdd431483c items=0 ppid=2247 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 00:47:25.127000 audit[2358]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.127000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd85c96950 a2=0 a3=7ffd85c9693c items=0 ppid=2247 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 00:47:25.129000 audit[2360]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.129000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4ffa18c0 a2=0 a3=7ffc4ffa18ac items=0 ppid=2247 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.129000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 00:47:25.130000 audit[2361]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.130000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed8867360 a2=0 a3=7ffed886734c items=0 ppid=2247 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 00:47:25.133000 audit[2363]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.133000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff207a2950 a2=0 a3=7fff207a293c items=0 ppid=2247 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 00:47:25.136000 audit[2366]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.136000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb3a60830 a2=0 a3=7ffcb3a6081c items=0 ppid=2247 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 00:47:25.139000 audit[2369]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.139000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea29c74e0 a2=0 a3=7ffea29c74cc items=0 ppid=2247 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 00:47:25.140000 audit[2370]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.140000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd8cc0450 a2=0 a3=7fffd8cc043c items=0 ppid=2247 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 00:47:25.141000 audit[2372]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.141000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc11a2f140 a2=0 a3=7ffc11a2f12c items=0 ppid=2247 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:47:25.144000 audit[2375]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.144000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc4f372800 a2=0 a3=7ffc4f3727ec items=0 ppid=2247 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 00:47:25.145000 audit[2376]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.145000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc32115410 a2=0 a3=7ffc321153fc items=0 ppid=2247 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 00:47:25.147000 audit[2378]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.147000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffced731260 a2=0 a3=7ffced73124c items=0 ppid=2247 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.147000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 00:47:25.148000 audit[2379]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.148000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc357ff920 a2=0 a3=7ffc357ff90c items=0 ppid=2247 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 00:47:25.149000 audit[2381]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.149000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff18d4cea0 a2=0 a3=7fff18d4ce8c items=0 ppid=2247 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:47:25.152000 audit[2384]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 00:47:25.152000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe019b6eb0 a2=0 a3=7ffe019b6e9c items=0 ppid=2247 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 00:47:25.154000 audit[2386]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 00:47:25.154000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe3929d9d0 a2=0 a3=7ffe3929d9bc items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.154000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:25.154000 audit[2386]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 00:47:25.154000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe3929d9d0 a2=0 a3=7ffe3929d9bc items=0 ppid=2247 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:25.154000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:25.425463 kubelet[2048]: E0515 00:47:25.425352 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:26.499754 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1259778921.mount: Deactivated successfully. May 15 00:47:27.144434 env[1207]: time="2025-05-15T00:47:27.144392767Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:27.146319 env[1207]: time="2025-05-15T00:47:27.146275544Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:27.147997 env[1207]: time="2025-05-15T00:47:27.147961339Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:27.149494 env[1207]: time="2025-05-15T00:47:27.149465281Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:27.149964 env[1207]: time="2025-05-15T00:47:27.149935690Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 00:47:27.151876 env[1207]: time="2025-05-15T00:47:27.151823447Z" level=info msg="CreateContainer within sandbox \"cfdce373c342498d6441abbb19705a567b02205d2f6306e9bdd23b15e8c485b8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 00:47:27.164456 env[1207]: time="2025-05-15T00:47:27.164422071Z" level=info msg="CreateContainer within sandbox \"cfdce373c342498d6441abbb19705a567b02205d2f6306e9bdd23b15e8c485b8\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"57714504c1f6a6fc0c5e85843d4e6291978602d87f7b3e0011531d0a3b9e203d\"" May 15 00:47:27.164834 env[1207]: time="2025-05-15T00:47:27.164808762Z" level=info msg="StartContainer for \"57714504c1f6a6fc0c5e85843d4e6291978602d87f7b3e0011531d0a3b9e203d\"" May 15 00:47:27.180679 systemd[1]: Started cri-containerd-57714504c1f6a6fc0c5e85843d4e6291978602d87f7b3e0011531d0a3b9e203d.scope. May 15 00:47:27.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.187000 audit: BPF prog-id=114 op=LOAD May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2157 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:27.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537373134353034633166366136666330633565383538343364346536 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2157 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:27.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537373134353034633166366136666330633565383538343364346536 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit: BPF prog-id=115 op=LOAD May 15 00:47:27.188000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024f8a0 items=0 ppid=2157 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:27.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537373134353034633166366136666330633565383538343364346536 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit: BPF prog-id=116 op=LOAD May 15 00:47:27.188000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024f8e8 items=0 ppid=2157 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:27.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537373134353034633166366136666330633565383538343364346536 May 15 00:47:27.188000 audit: BPF prog-id=116 op=UNLOAD May 15 00:47:27.188000 audit: BPF prog-id=115 op=UNLOAD May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:27.188000 audit: BPF prog-id=117 op=LOAD May 15 00:47:27.188000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024fcf8 items=0 ppid=2157 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:27.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537373134353034633166366136666330633565383538343364346536 May 15 00:47:27.199962 env[1207]: time="2025-05-15T00:47:27.199918150Z" level=info msg="StartContainer for \"57714504c1f6a6fc0c5e85843d4e6291978602d87f7b3e0011531d0a3b9e203d\" returns successfully" May 15 00:47:27.440447 kubelet[2048]: I0515 00:47:27.440095 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-7d2l7" podStartSLOduration=5.440070513 podStartE2EDuration="5.440070513s" podCreationTimestamp="2025-05-15 00:47:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:47:25.433851592 +0000 UTC m=+17.138195219" watchObservedRunningTime="2025-05-15 00:47:27.440070513 +0000 UTC m=+19.144414140" May 15 00:47:28.401687 kubelet[2048]: I0515 00:47:28.401627 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-9927c" podStartSLOduration=3.358226072 podStartE2EDuration="6.401604851s" podCreationTimestamp="2025-05-15 00:47:22 +0000 UTC" firstStartedPulling="2025-05-15 00:47:24.107291259 +0000 UTC m=+15.811634886" lastFinishedPulling="2025-05-15 00:47:27.150670038 +0000 UTC m=+18.855013665" observedRunningTime="2025-05-15 00:47:27.440904067 +0000 UTC m=+19.145247694" watchObservedRunningTime="2025-05-15 00:47:28.401604851 +0000 UTC m=+20.105948478" May 15 00:47:30.003000 audit[2429]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:30.008369 kernel: kauditd_printk_skb: 357 callbacks suppressed May 15 00:47:30.008520 kernel: audit: type=1325 audit(1747270050.003:911): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:30.008544 kernel: audit: type=1300 audit(1747270050.003:911): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd5f4d9030 a2=0 a3=7ffd5f4d901c items=0 ppid=2247 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.003000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd5f4d9030 a2=0 a3=7ffd5f4d901c items=0 ppid=2247 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.003000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:30.015174 kernel: audit: type=1327 audit(1747270050.003:911): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:30.015000 audit[2429]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:30.015000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd5f4d9030 a2=0 a3=0 items=0 ppid=2247 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.023573 kernel: audit: type=1325 audit(1747270050.015:912): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:30.023623 kernel: audit: type=1300 audit(1747270050.015:912): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd5f4d9030 a2=0 a3=0 items=0 ppid=2247 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.023643 kernel: audit: type=1327 audit(1747270050.015:912): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:30.015000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:30.029000 audit[2431]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:30.029000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffca7d80fe0 a2=0 a3=7ffca7d80fcc items=0 ppid=2247 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.037948 kernel: audit: type=1325 audit(1747270050.029:913): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:30.038012 kernel: audit: type=1300 audit(1747270050.029:913): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffca7d80fe0 a2=0 a3=7ffca7d80fcc items=0 ppid=2247 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.038038 kernel: audit: type=1327 audit(1747270050.029:913): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:30.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:30.041000 audit[2431]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:30.041000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffca7d80fe0 a2=0 a3=0 items=0 ppid=2247 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.045296 kernel: audit: type=1325 audit(1747270050.041:914): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:30.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:30.134418 kubelet[2048]: I0515 00:47:30.134365 2048 topology_manager.go:215] "Topology Admit Handler" podUID="3e047a7d-c105-44d0-8b2d-7877e185f30e" podNamespace="calico-system" podName="calico-typha-688d56fbf6-4cll7" May 15 00:47:30.140147 systemd[1]: Created slice kubepods-besteffort-pod3e047a7d_c105_44d0_8b2d_7877e185f30e.slice. May 15 00:47:30.195548 kubelet[2048]: I0515 00:47:30.195501 2048 topology_manager.go:215] "Topology Admit Handler" podUID="f094111b-338a-4387-84e5-81c24bc731aa" podNamespace="calico-system" podName="calico-node-vfrzp" May 15 00:47:30.201358 systemd[1]: Created slice kubepods-besteffort-podf094111b_338a_4387_84e5_81c24bc731aa.slice. May 15 00:47:30.207462 kubelet[2048]: I0515 00:47:30.207426 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f094111b-338a-4387-84e5-81c24bc731aa-cni-net-dir\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.207612 kubelet[2048]: I0515 00:47:30.207459 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/3e047a7d-c105-44d0-8b2d-7877e185f30e-typha-certs\") pod \"calico-typha-688d56fbf6-4cll7\" (UID: \"3e047a7d-c105-44d0-8b2d-7877e185f30e\") " pod="calico-system/calico-typha-688d56fbf6-4cll7" May 15 00:47:30.207612 kubelet[2048]: I0515 00:47:30.207491 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f094111b-338a-4387-84e5-81c24bc731aa-tigera-ca-bundle\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.207612 kubelet[2048]: I0515 00:47:30.207503 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f094111b-338a-4387-84e5-81c24bc731aa-var-lib-calico\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.207612 kubelet[2048]: I0515 00:47:30.207517 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f094111b-338a-4387-84e5-81c24bc731aa-lib-modules\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.207612 kubelet[2048]: I0515 00:47:30.207529 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f094111b-338a-4387-84e5-81c24bc731aa-var-run-calico\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.207741 kubelet[2048]: I0515 00:47:30.207555 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f094111b-338a-4387-84e5-81c24bc731aa-cni-log-dir\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.207741 kubelet[2048]: I0515 00:47:30.207568 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f094111b-338a-4387-84e5-81c24bc731aa-cni-bin-dir\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.207741 kubelet[2048]: I0515 00:47:30.207583 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r6cfc\" (UniqueName: \"kubernetes.io/projected/3e047a7d-c105-44d0-8b2d-7877e185f30e-kube-api-access-r6cfc\") pod \"calico-typha-688d56fbf6-4cll7\" (UID: \"3e047a7d-c105-44d0-8b2d-7877e185f30e\") " pod="calico-system/calico-typha-688d56fbf6-4cll7" May 15 00:47:30.207741 kubelet[2048]: I0515 00:47:30.207602 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f094111b-338a-4387-84e5-81c24bc731aa-xtables-lock\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.207741 kubelet[2048]: I0515 00:47:30.207628 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f094111b-338a-4387-84e5-81c24bc731aa-policysync\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.207856 kubelet[2048]: I0515 00:47:30.207641 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f094111b-338a-4387-84e5-81c24bc731aa-node-certs\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.207856 kubelet[2048]: I0515 00:47:30.207654 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3e047a7d-c105-44d0-8b2d-7877e185f30e-tigera-ca-bundle\") pod \"calico-typha-688d56fbf6-4cll7\" (UID: \"3e047a7d-c105-44d0-8b2d-7877e185f30e\") " pod="calico-system/calico-typha-688d56fbf6-4cll7" May 15 00:47:30.207856 kubelet[2048]: I0515 00:47:30.207669 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f094111b-338a-4387-84e5-81c24bc731aa-flexvol-driver-host\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.207856 kubelet[2048]: I0515 00:47:30.207683 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4bn7c\" (UniqueName: \"kubernetes.io/projected/f094111b-338a-4387-84e5-81c24bc731aa-kube-api-access-4bn7c\") pod \"calico-node-vfrzp\" (UID: \"f094111b-338a-4387-84e5-81c24bc731aa\") " pod="calico-system/calico-node-vfrzp" May 15 00:47:30.310955 kubelet[2048]: E0515 00:47:30.309885 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.310955 kubelet[2048]: W0515 00:47:30.309923 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.310955 kubelet[2048]: E0515 00:47:30.309947 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.310955 kubelet[2048]: E0515 00:47:30.310110 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.310955 kubelet[2048]: W0515 00:47:30.310117 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.310955 kubelet[2048]: E0515 00:47:30.310126 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.312559 kubelet[2048]: E0515 00:47:30.312538 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.312559 kubelet[2048]: W0515 00:47:30.312551 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.312559 kubelet[2048]: E0515 00:47:30.312565 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.312778 kubelet[2048]: E0515 00:47:30.312755 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.312805 kubelet[2048]: W0515 00:47:30.312778 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.312805 kubelet[2048]: E0515 00:47:30.312798 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.409604 kubelet[2048]: E0515 00:47:30.409577 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.409604 kubelet[2048]: W0515 00:47:30.409595 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.409604 kubelet[2048]: E0515 00:47:30.409613 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.409821 kubelet[2048]: E0515 00:47:30.409791 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.409821 kubelet[2048]: W0515 00:47:30.409799 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.409821 kubelet[2048]: E0515 00:47:30.409806 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.449835 kubelet[2048]: E0515 00:47:30.449809 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.450066 kubelet[2048]: W0515 00:47:30.449999 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.450159 kubelet[2048]: E0515 00:47:30.450144 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.457872 kubelet[2048]: E0515 00:47:30.457828 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.457872 kubelet[2048]: W0515 00:47:30.457852 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.458031 kubelet[2048]: E0515 00:47:30.457889 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.475570 kubelet[2048]: I0515 00:47:30.475510 2048 topology_manager.go:215] "Topology Admit Handler" podUID="e18a49a0-35d4-453b-952b-0a4f021f03ad" podNamespace="calico-system" podName="csi-node-driver-gjf4x" May 15 00:47:30.475851 kubelet[2048]: E0515 00:47:30.475802 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjf4x" podUID="e18a49a0-35d4-453b-952b-0a4f021f03ad" May 15 00:47:30.502297 kubelet[2048]: E0515 00:47:30.502260 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.502297 kubelet[2048]: W0515 00:47:30.502288 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.502471 kubelet[2048]: E0515 00:47:30.502311 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.502647 kubelet[2048]: E0515 00:47:30.502630 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.502647 kubelet[2048]: W0515 00:47:30.502646 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.502736 kubelet[2048]: E0515 00:47:30.502655 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.502880 kubelet[2048]: E0515 00:47:30.502845 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.502880 kubelet[2048]: W0515 00:47:30.502873 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.502880 kubelet[2048]: E0515 00:47:30.502881 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.503165 kubelet[2048]: E0515 00:47:30.503129 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.503165 kubelet[2048]: W0515 00:47:30.503158 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.503165 kubelet[2048]: E0515 00:47:30.503184 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.503512 kubelet[2048]: E0515 00:47:30.503486 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.503512 kubelet[2048]: W0515 00:47:30.503497 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.503512 kubelet[2048]: E0515 00:47:30.503505 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.503934 kubelet[2048]: E0515 00:47:30.503909 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.503934 kubelet[2048]: W0515 00:47:30.503927 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.503934 kubelet[2048]: E0515 00:47:30.503935 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.504132 kubelet[2048]: E0515 00:47:30.504100 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.504132 kubelet[2048]: W0515 00:47:30.504123 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.504132 kubelet[2048]: E0515 00:47:30.504130 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.508387 kubelet[2048]: E0515 00:47:30.508366 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.508999 kubelet[2048]: W0515 00:47:30.508965 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.508999 kubelet[2048]: E0515 00:47:30.508997 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.510159 kubelet[2048]: E0515 00:47:30.510141 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.510217 kubelet[2048]: W0515 00:47:30.510166 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.510217 kubelet[2048]: E0515 00:47:30.510179 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.510890 kubelet[2048]: E0515 00:47:30.510875 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.510890 kubelet[2048]: W0515 00:47:30.510889 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.510993 kubelet[2048]: E0515 00:47:30.510904 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.511118 kubelet[2048]: E0515 00:47:30.511106 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.511118 kubelet[2048]: W0515 00:47:30.511116 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.511194 kubelet[2048]: E0515 00:47:30.511123 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.511349 kubelet[2048]: E0515 00:47:30.511337 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.511349 kubelet[2048]: W0515 00:47:30.511347 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.511434 kubelet[2048]: E0515 00:47:30.511356 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.511482 kubelet[2048]: E0515 00:47:30.511465 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:30.511821 env[1207]: time="2025-05-15T00:47:30.511774243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vfrzp,Uid:f094111b-338a-4387-84e5-81c24bc731aa,Namespace:calico-system,Attempt:0,}" May 15 00:47:30.512422 kubelet[2048]: E0515 00:47:30.512384 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.512422 kubelet[2048]: W0515 00:47:30.512413 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.512422 kubelet[2048]: E0515 00:47:30.512423 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.512664 kubelet[2048]: E0515 00:47:30.512647 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.512664 kubelet[2048]: W0515 00:47:30.512658 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.512664 kubelet[2048]: E0515 00:47:30.512666 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.512878 kubelet[2048]: E0515 00:47:30.512846 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.512878 kubelet[2048]: W0515 00:47:30.512864 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.512986 kubelet[2048]: E0515 00:47:30.512886 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.513109 kubelet[2048]: E0515 00:47:30.513092 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.513109 kubelet[2048]: W0515 00:47:30.513102 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.513200 kubelet[2048]: E0515 00:47:30.513115 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.513340 kubelet[2048]: E0515 00:47:30.513326 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.513340 kubelet[2048]: W0515 00:47:30.513336 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.513340 kubelet[2048]: E0515 00:47:30.513343 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.513528 kubelet[2048]: E0515 00:47:30.513514 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.513528 kubelet[2048]: W0515 00:47:30.513525 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.513528 kubelet[2048]: E0515 00:47:30.513532 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.513689 kubelet[2048]: E0515 00:47:30.513677 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.513689 kubelet[2048]: W0515 00:47:30.513686 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.513772 kubelet[2048]: E0515 00:47:30.513693 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.513841 kubelet[2048]: E0515 00:47:30.513829 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.513841 kubelet[2048]: W0515 00:47:30.513837 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.513926 kubelet[2048]: E0515 00:47:30.513844 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.514116 kubelet[2048]: E0515 00:47:30.514103 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.514165 kubelet[2048]: W0515 00:47:30.514125 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.514165 kubelet[2048]: E0515 00:47:30.514133 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.514165 kubelet[2048]: I0515 00:47:30.514156 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e18a49a0-35d4-453b-952b-0a4f021f03ad-varrun\") pod \"csi-node-driver-gjf4x\" (UID: \"e18a49a0-35d4-453b-952b-0a4f021f03ad\") " pod="calico-system/csi-node-driver-gjf4x" May 15 00:47:30.514335 kubelet[2048]: E0515 00:47:30.514310 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.514335 kubelet[2048]: W0515 00:47:30.514322 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.514335 kubelet[2048]: E0515 00:47:30.514331 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.514431 kubelet[2048]: I0515 00:47:30.514343 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e18a49a0-35d4-453b-952b-0a4f021f03ad-registration-dir\") pod \"csi-node-driver-gjf4x\" (UID: \"e18a49a0-35d4-453b-952b-0a4f021f03ad\") " pod="calico-system/csi-node-driver-gjf4x" May 15 00:47:30.514503 kubelet[2048]: E0515 00:47:30.514484 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.514503 kubelet[2048]: W0515 00:47:30.514498 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.514503 kubelet[2048]: E0515 00:47:30.514505 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.514645 kubelet[2048]: I0515 00:47:30.514518 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e18a49a0-35d4-453b-952b-0a4f021f03ad-kubelet-dir\") pod \"csi-node-driver-gjf4x\" (UID: \"e18a49a0-35d4-453b-952b-0a4f021f03ad\") " pod="calico-system/csi-node-driver-gjf4x" May 15 00:47:30.514645 kubelet[2048]: E0515 00:47:30.514644 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.514699 kubelet[2048]: W0515 00:47:30.514650 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.514699 kubelet[2048]: E0515 00:47:30.514657 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.514699 kubelet[2048]: I0515 00:47:30.514668 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e18a49a0-35d4-453b-952b-0a4f021f03ad-socket-dir\") pod \"csi-node-driver-gjf4x\" (UID: \"e18a49a0-35d4-453b-952b-0a4f021f03ad\") " pod="calico-system/csi-node-driver-gjf4x" May 15 00:47:30.514832 kubelet[2048]: E0515 00:47:30.514815 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.514832 kubelet[2048]: W0515 00:47:30.514826 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.514832 kubelet[2048]: E0515 00:47:30.514834 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.514937 kubelet[2048]: I0515 00:47:30.514846 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9w7sx\" (UniqueName: \"kubernetes.io/projected/e18a49a0-35d4-453b-952b-0a4f021f03ad-kube-api-access-9w7sx\") pod \"csi-node-driver-gjf4x\" (UID: \"e18a49a0-35d4-453b-952b-0a4f021f03ad\") " pod="calico-system/csi-node-driver-gjf4x" May 15 00:47:30.515095 kubelet[2048]: E0515 00:47:30.515080 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.515095 kubelet[2048]: W0515 00:47:30.515091 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.515166 kubelet[2048]: E0515 00:47:30.515103 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.515279 kubelet[2048]: E0515 00:47:30.515265 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.515279 kubelet[2048]: W0515 00:47:30.515276 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.515279 kubelet[2048]: E0515 00:47:30.515283 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.515457 kubelet[2048]: E0515 00:47:30.515442 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.515457 kubelet[2048]: W0515 00:47:30.515452 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.515457 kubelet[2048]: E0515 00:47:30.515464 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.515645 kubelet[2048]: E0515 00:47:30.515633 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.515645 kubelet[2048]: W0515 00:47:30.515642 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.515719 kubelet[2048]: E0515 00:47:30.515654 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.515806 kubelet[2048]: E0515 00:47:30.515793 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.515806 kubelet[2048]: W0515 00:47:30.515802 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.515890 kubelet[2048]: E0515 00:47:30.515813 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.515962 kubelet[2048]: E0515 00:47:30.515948 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.515962 kubelet[2048]: W0515 00:47:30.515957 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.516056 kubelet[2048]: E0515 00:47:30.516016 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.516227 kubelet[2048]: E0515 00:47:30.516212 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.516227 kubelet[2048]: W0515 00:47:30.516224 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.516341 kubelet[2048]: E0515 00:47:30.516324 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.516500 kubelet[2048]: E0515 00:47:30.516486 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.516500 kubelet[2048]: W0515 00:47:30.516498 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.516572 kubelet[2048]: E0515 00:47:30.516510 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.516683 kubelet[2048]: E0515 00:47:30.516669 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.516683 kubelet[2048]: W0515 00:47:30.516678 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.516683 kubelet[2048]: E0515 00:47:30.516685 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.516920 kubelet[2048]: E0515 00:47:30.516870 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.516920 kubelet[2048]: W0515 00:47:30.516877 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.516920 kubelet[2048]: E0515 00:47:30.516883 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.615594 kubelet[2048]: E0515 00:47:30.615492 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.615594 kubelet[2048]: W0515 00:47:30.615512 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.615594 kubelet[2048]: E0515 00:47:30.615528 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.615787 kubelet[2048]: E0515 00:47:30.615771 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.615787 kubelet[2048]: W0515 00:47:30.615784 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.615848 kubelet[2048]: E0515 00:47:30.615794 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.616023 kubelet[2048]: E0515 00:47:30.615986 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.616023 kubelet[2048]: W0515 00:47:30.616006 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.616023 kubelet[2048]: E0515 00:47:30.616025 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.616267 kubelet[2048]: E0515 00:47:30.616248 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.616267 kubelet[2048]: W0515 00:47:30.616259 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.616267 kubelet[2048]: E0515 00:47:30.616266 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.616440 kubelet[2048]: E0515 00:47:30.616435 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.616469 kubelet[2048]: W0515 00:47:30.616443 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.616469 kubelet[2048]: E0515 00:47:30.616451 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.616643 kubelet[2048]: E0515 00:47:30.616625 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.616708 kubelet[2048]: W0515 00:47:30.616651 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.616708 kubelet[2048]: E0515 00:47:30.616663 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.617011 kubelet[2048]: E0515 00:47:30.616909 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.617011 kubelet[2048]: W0515 00:47:30.616933 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.617011 kubelet[2048]: E0515 00:47:30.616965 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.617202 kubelet[2048]: E0515 00:47:30.617190 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.617202 kubelet[2048]: W0515 00:47:30.617202 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.617318 kubelet[2048]: E0515 00:47:30.617227 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.617364 kubelet[2048]: E0515 00:47:30.617355 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.617392 kubelet[2048]: W0515 00:47:30.617364 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.617417 kubelet[2048]: E0515 00:47:30.617390 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.617512 kubelet[2048]: E0515 00:47:30.617503 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.617544 kubelet[2048]: W0515 00:47:30.617511 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.617544 kubelet[2048]: E0515 00:47:30.617533 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.617660 kubelet[2048]: E0515 00:47:30.617651 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.617690 kubelet[2048]: W0515 00:47:30.617659 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.617690 kubelet[2048]: E0515 00:47:30.617678 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.617792 kubelet[2048]: E0515 00:47:30.617784 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.617823 kubelet[2048]: W0515 00:47:30.617792 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.617823 kubelet[2048]: E0515 00:47:30.617810 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.617950 kubelet[2048]: E0515 00:47:30.617938 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.617950 kubelet[2048]: W0515 00:47:30.617945 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.618030 kubelet[2048]: E0515 00:47:30.617956 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.618233 kubelet[2048]: E0515 00:47:30.618192 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.618233 kubelet[2048]: W0515 00:47:30.618205 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.618233 kubelet[2048]: E0515 00:47:30.618220 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.618383 kubelet[2048]: E0515 00:47:30.618363 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.618383 kubelet[2048]: W0515 00:47:30.618370 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.618383 kubelet[2048]: E0515 00:47:30.618377 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.618605 kubelet[2048]: E0515 00:47:30.618592 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.618691 kubelet[2048]: W0515 00:47:30.618616 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.618691 kubelet[2048]: E0515 00:47:30.618632 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.618817 kubelet[2048]: E0515 00:47:30.618807 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.618876 kubelet[2048]: W0515 00:47:30.618815 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.618876 kubelet[2048]: E0515 00:47:30.618836 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.619006 kubelet[2048]: E0515 00:47:30.618994 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.619006 kubelet[2048]: W0515 00:47:30.619002 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.619086 kubelet[2048]: E0515 00:47:30.619024 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.619159 kubelet[2048]: E0515 00:47:30.619143 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.619159 kubelet[2048]: W0515 00:47:30.619154 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.619234 kubelet[2048]: E0515 00:47:30.619187 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.619354 kubelet[2048]: E0515 00:47:30.619313 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.619354 kubelet[2048]: W0515 00:47:30.619324 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.619354 kubelet[2048]: E0515 00:47:30.619336 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.619525 kubelet[2048]: E0515 00:47:30.619510 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.619525 kubelet[2048]: W0515 00:47:30.619520 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.619525 kubelet[2048]: E0515 00:47:30.619531 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.619701 kubelet[2048]: E0515 00:47:30.619689 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.619729 kubelet[2048]: W0515 00:47:30.619701 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.619729 kubelet[2048]: E0515 00:47:30.619716 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.619878 kubelet[2048]: E0515 00:47:30.619867 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.619878 kubelet[2048]: W0515 00:47:30.619874 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.619945 kubelet[2048]: E0515 00:47:30.619885 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.620131 kubelet[2048]: E0515 00:47:30.620117 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.620131 kubelet[2048]: W0515 00:47:30.620128 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.620205 kubelet[2048]: E0515 00:47:30.620137 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.636184 kubelet[2048]: E0515 00:47:30.636162 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.636184 kubelet[2048]: W0515 00:47:30.636178 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.636324 kubelet[2048]: E0515 00:47:30.636200 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.644568 kubelet[2048]: E0515 00:47:30.644539 2048 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 00:47:30.644568 kubelet[2048]: W0515 00:47:30.644559 2048 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 00:47:30.644568 kubelet[2048]: E0515 00:47:30.644568 2048 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 00:47:30.743123 kubelet[2048]: E0515 00:47:30.743078 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:30.743510 env[1207]: time="2025-05-15T00:47:30.743468182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-688d56fbf6-4cll7,Uid:3e047a7d-c105-44d0-8b2d-7877e185f30e,Namespace:calico-system,Attempt:0,}" May 15 00:47:30.803495 env[1207]: time="2025-05-15T00:47:30.803344018Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:30.803495 env[1207]: time="2025-05-15T00:47:30.803377761Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:30.803495 env[1207]: time="2025-05-15T00:47:30.803386828Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:30.803790 env[1207]: time="2025-05-15T00:47:30.803741528Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cd847c1a37c895c23d1473b32a0145b5b5c17508f62c8a49633b058e78ca3862 pid=2514 runtime=io.containerd.runc.v2 May 15 00:47:30.807207 env[1207]: time="2025-05-15T00:47:30.807150451Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:30.807207 env[1207]: time="2025-05-15T00:47:30.807188573Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:30.807339 env[1207]: time="2025-05-15T00:47:30.807199413Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:30.807416 env[1207]: time="2025-05-15T00:47:30.807386577Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/042a60de10ece6054aa35abf770e0ebb3f81d3438d4ff08c1051987a37f52be9 pid=2531 runtime=io.containerd.runc.v2 May 15 00:47:30.818460 systemd[1]: Started cri-containerd-cd847c1a37c895c23d1473b32a0145b5b5c17508f62c8a49633b058e78ca3862.scope. May 15 00:47:30.820931 systemd[1]: Started cri-containerd-042a60de10ece6054aa35abf770e0ebb3f81d3438d4ff08c1051987a37f52be9.scope. May 15 00:47:30.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit: BPF prog-id=118 op=LOAD May 15 00:47:30.826000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2514 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364383437633161333763383935633233643134373362333261303134 May 15 00:47:30.826000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2514 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364383437633161333763383935633233643134373362333261303134 May 15 00:47:30.826000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.826000 audit: BPF prog-id=119 op=LOAD May 15 00:47:30.826000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024ac0 items=0 ppid=2514 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364383437633161333763383935633233643134373362333261303134 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit: BPF prog-id=120 op=LOAD May 15 00:47:30.827000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024b08 items=0 ppid=2514 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364383437633161333763383935633233643134373362333261303134 May 15 00:47:30.827000 audit: BPF prog-id=120 op=UNLOAD May 15 00:47:30.827000 audit: BPF prog-id=119 op=UNLOAD May 15 00:47:30.827000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.827000 audit: BPF prog-id=121 op=LOAD May 15 00:47:30.827000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024f18 items=0 ppid=2514 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364383437633161333763383935633233643134373362333261303134 May 15 00:47:30.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit: BPF prog-id=122 op=LOAD May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2531 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034326136306465313065636536303534616133356162663737306530 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2531 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034326136306465313065636536303534616133356162663737306530 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit: BPF prog-id=123 op=LOAD May 15 00:47:30.833000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000364440 items=0 ppid=2531 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034326136306465313065636536303534616133356162663737306530 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit: BPF prog-id=124 op=LOAD May 15 00:47:30.833000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000364488 items=0 ppid=2531 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034326136306465313065636536303534616133356162663737306530 May 15 00:47:30.833000 audit: BPF prog-id=124 op=UNLOAD May 15 00:47:30.833000 audit: BPF prog-id=123 op=UNLOAD May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:30.833000 audit: BPF prog-id=125 op=LOAD May 15 00:47:30.833000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000364898 items=0 ppid=2531 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:30.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034326136306465313065636536303534616133356162663737306530 May 15 00:47:30.838805 env[1207]: time="2025-05-15T00:47:30.838773890Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vfrzp,Uid:f094111b-338a-4387-84e5-81c24bc731aa,Namespace:calico-system,Attempt:0,} returns sandbox id \"cd847c1a37c895c23d1473b32a0145b5b5c17508f62c8a49633b058e78ca3862\"" May 15 00:47:30.839726 kubelet[2048]: E0515 00:47:30.839693 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:30.840787 env[1207]: time="2025-05-15T00:47:30.840750150Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 00:47:30.861767 env[1207]: time="2025-05-15T00:47:30.861708652Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-688d56fbf6-4cll7,Uid:3e047a7d-c105-44d0-8b2d-7877e185f30e,Namespace:calico-system,Attempt:0,} returns sandbox id \"042a60de10ece6054aa35abf770e0ebb3f81d3438d4ff08c1051987a37f52be9\"" May 15 00:47:30.862304 kubelet[2048]: E0515 00:47:30.862282 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:31.055000 audit[2585]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:31.055000 audit[2585]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd7d0b11e0 a2=0 a3=7ffd7d0b11cc items=0 ppid=2247 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:31.055000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:31.059000 audit[2585]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2585 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:31.059000 audit[2585]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd7d0b11e0 a2=0 a3=0 items=0 ppid=2247 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:31.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:32.391012 kubelet[2048]: E0515 00:47:32.390951 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjf4x" podUID="e18a49a0-35d4-453b-952b-0a4f021f03ad" May 15 00:47:32.533792 env[1207]: time="2025-05-15T00:47:32.533735122Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:32.535631 env[1207]: time="2025-05-15T00:47:32.535571355Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:32.537052 env[1207]: time="2025-05-15T00:47:32.537005240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:32.538467 env[1207]: time="2025-05-15T00:47:32.538438753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:32.538862 env[1207]: time="2025-05-15T00:47:32.538828918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 00:47:32.540408 env[1207]: time="2025-05-15T00:47:32.540370696Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 00:47:32.541312 env[1207]: time="2025-05-15T00:47:32.541276696Z" level=info msg="CreateContainer within sandbox \"cd847c1a37c895c23d1473b32a0145b5b5c17508f62c8a49633b058e78ca3862\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 00:47:32.558060 env[1207]: time="2025-05-15T00:47:32.558014480Z" level=info msg="CreateContainer within sandbox \"cd847c1a37c895c23d1473b32a0145b5b5c17508f62c8a49633b058e78ca3862\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3910f42d9d08bcd0a8fe93db2a2b69e4a4eaa02a9112ac5822ff7fae37026efd\"" May 15 00:47:32.558477 env[1207]: time="2025-05-15T00:47:32.558456033Z" level=info msg="StartContainer for \"3910f42d9d08bcd0a8fe93db2a2b69e4a4eaa02a9112ac5822ff7fae37026efd\"" May 15 00:47:32.573901 systemd[1]: Started cri-containerd-3910f42d9d08bcd0a8fe93db2a2b69e4a4eaa02a9112ac5822ff7fae37026efd.scope. May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7eff505a6508 items=0 ppid=2514 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:32.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313066343264396430386263643061386665393364623261326236 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit: BPF prog-id=126 op=LOAD May 15 00:47:32.584000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00030dd58 items=0 ppid=2514 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:32.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313066343264396430386263643061386665393364623261326236 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit: BPF prog-id=127 op=LOAD May 15 00:47:32.584000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00030dda8 items=0 ppid=2514 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:32.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313066343264396430386263643061386665393364623261326236 May 15 00:47:32.584000 audit: BPF prog-id=127 op=UNLOAD May 15 00:47:32.584000 audit: BPF prog-id=126 op=UNLOAD May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:32.584000 audit: BPF prog-id=128 op=LOAD May 15 00:47:32.584000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00030de38 items=0 ppid=2514 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:32.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313066343264396430386263643061386665393364623261326236 May 15 00:47:32.597170 env[1207]: time="2025-05-15T00:47:32.597090002Z" level=info msg="StartContainer for \"3910f42d9d08bcd0a8fe93db2a2b69e4a4eaa02a9112ac5822ff7fae37026efd\" returns successfully" May 15 00:47:32.604302 systemd[1]: cri-containerd-3910f42d9d08bcd0a8fe93db2a2b69e4a4eaa02a9112ac5822ff7fae37026efd.scope: Deactivated successfully. May 15 00:47:32.608000 audit: BPF prog-id=128 op=UNLOAD May 15 00:47:32.621512 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3910f42d9d08bcd0a8fe93db2a2b69e4a4eaa02a9112ac5822ff7fae37026efd-rootfs.mount: Deactivated successfully. May 15 00:47:32.661450 env[1207]: time="2025-05-15T00:47:32.661332395Z" level=info msg="shim disconnected" id=3910f42d9d08bcd0a8fe93db2a2b69e4a4eaa02a9112ac5822ff7fae37026efd May 15 00:47:32.661450 env[1207]: time="2025-05-15T00:47:32.661405564Z" level=warning msg="cleaning up after shim disconnected" id=3910f42d9d08bcd0a8fe93db2a2b69e4a4eaa02a9112ac5822ff7fae37026efd namespace=k8s.io May 15 00:47:32.661450 env[1207]: time="2025-05-15T00:47:32.661418698Z" level=info msg="cleaning up dead shim" May 15 00:47:32.668039 env[1207]: time="2025-05-15T00:47:32.667991203Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:47:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2632 runtime=io.containerd.runc.v2\n" May 15 00:47:33.441604 kubelet[2048]: E0515 00:47:33.441568 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:34.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.19:22-10.0.0.1:54206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:34.205112 systemd[1]: Started sshd@7-10.0.0.19:22-10.0.0.1:54206.service. May 15 00:47:34.237000 audit[2650]: USER_ACCT pid=2650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:34.239004 sshd[2650]: Accepted publickey for core from 10.0.0.1 port 54206 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:47:34.238000 audit[2650]: CRED_ACQ pid=2650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:34.238000 audit[2650]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7c15b850 a2=3 a3=0 items=0 ppid=1 pid=2650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:34.238000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:47:34.240222 sshd[2650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:47:34.244372 systemd-logind[1191]: New session 8 of user core. May 15 00:47:34.245529 systemd[1]: Started session-8.scope. May 15 00:47:34.249000 audit[2650]: USER_START pid=2650 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:34.250000 audit[2652]: CRED_ACQ pid=2652 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:34.353976 sshd[2650]: pam_unix(sshd:session): session closed for user core May 15 00:47:34.353000 audit[2650]: USER_END pid=2650 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:34.353000 audit[2650]: CRED_DISP pid=2650 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:34.356126 systemd[1]: sshd@7-10.0.0.19:22-10.0.0.1:54206.service: Deactivated successfully. May 15 00:47:34.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.19:22-10.0.0.1:54206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:34.356753 systemd[1]: session-8.scope: Deactivated successfully. May 15 00:47:34.357521 systemd-logind[1191]: Session 8 logged out. Waiting for processes to exit. May 15 00:47:34.358165 systemd-logind[1191]: Removed session 8. May 15 00:47:34.391105 kubelet[2048]: E0515 00:47:34.391061 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjf4x" podUID="e18a49a0-35d4-453b-952b-0a4f021f03ad" May 15 00:47:35.820638 env[1207]: time="2025-05-15T00:47:35.820591532Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:35.822935 env[1207]: time="2025-05-15T00:47:35.822897998Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:35.824271 env[1207]: time="2025-05-15T00:47:35.824223605Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:35.825678 env[1207]: time="2025-05-15T00:47:35.825649904Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:35.826090 env[1207]: time="2025-05-15T00:47:35.826063312Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 15 00:47:35.827793 env[1207]: time="2025-05-15T00:47:35.827061983Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 00:47:35.837160 env[1207]: time="2025-05-15T00:47:35.837125015Z" level=info msg="CreateContainer within sandbox \"042a60de10ece6054aa35abf770e0ebb3f81d3438d4ff08c1051987a37f52be9\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 00:47:35.852480 env[1207]: time="2025-05-15T00:47:35.852423039Z" level=info msg="CreateContainer within sandbox \"042a60de10ece6054aa35abf770e0ebb3f81d3438d4ff08c1051987a37f52be9\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"41687cb0287902b53f7bd869a5520446381f1f91e76e94789c1799d0344d43b1\"" May 15 00:47:35.854184 env[1207]: time="2025-05-15T00:47:35.853024383Z" level=info msg="StartContainer for \"41687cb0287902b53f7bd869a5520446381f1f91e76e94789c1799d0344d43b1\"" May 15 00:47:35.866882 systemd[1]: Started cri-containerd-41687cb0287902b53f7bd869a5520446381f1f91e76e94789c1799d0344d43b1.scope. May 15 00:47:35.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.882724 kernel: kauditd_printk_skb: 177 callbacks suppressed May 15 00:47:35.882925 kernel: audit: type=1400 audit(1747270055.880:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.889641 kernel: audit: type=1400 audit(1747270055.880:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.889737 kernel: audit: type=1400 audit(1747270055.880:971): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.893145 kernel: audit: type=1400 audit(1747270055.880:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.899713 kernel: audit: type=1400 audit(1747270055.880:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.899775 kernel: audit: type=1400 audit(1747270055.880:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.903005 kernel: audit: type=1400 audit(1747270055.880:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.908938 kernel: audit: type=1400 audit(1747270055.880:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.908987 kernel: audit: type=1400 audit(1747270055.880:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.915182 kernel: audit: type=1400 audit(1747270055.881:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit: BPF prog-id=129 op=LOAD May 15 00:47:35.885000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2531 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:35.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363837636230323837393032623533663762643836396135353230 May 15 00:47:35.885000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2531 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:35.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363837636230323837393032623533663762643836396135353230 May 15 00:47:35.885000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.885000 audit: BPF prog-id=130 op=LOAD May 15 00:47:35.885000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002d5d10 items=0 ppid=2531 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:35.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363837636230323837393032623533663762643836396135353230 May 15 00:47:35.895000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.895000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.895000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.895000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.895000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.895000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.895000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.895000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.895000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.895000 audit: BPF prog-id=131 op=LOAD May 15 00:47:35.895000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002d5d58 items=0 ppid=2531 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:35.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363837636230323837393032623533663762643836396135353230 May 15 00:47:35.898000 audit: BPF prog-id=131 op=UNLOAD May 15 00:47:35.898000 audit: BPF prog-id=130 op=UNLOAD May 15 00:47:35.898000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.898000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.898000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.898000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.898000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.898000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.898000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.898000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.898000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.898000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:35.898000 audit: BPF prog-id=132 op=LOAD May 15 00:47:35.898000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003be168 items=0 ppid=2531 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:35.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363837636230323837393032623533663762643836396135353230 May 15 00:47:35.940035 env[1207]: time="2025-05-15T00:47:35.939989193Z" level=info msg="StartContainer for \"41687cb0287902b53f7bd869a5520446381f1f91e76e94789c1799d0344d43b1\" returns successfully" May 15 00:47:36.391459 kubelet[2048]: E0515 00:47:36.391409 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjf4x" podUID="e18a49a0-35d4-453b-952b-0a4f021f03ad" May 15 00:47:36.447938 kubelet[2048]: E0515 00:47:36.447903 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:37.453596 kubelet[2048]: I0515 00:47:37.453553 2048 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 00:47:37.454131 kubelet[2048]: E0515 00:47:37.454089 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:38.391422 kubelet[2048]: E0515 00:47:38.391366 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjf4x" podUID="e18a49a0-35d4-453b-952b-0a4f021f03ad" May 15 00:47:39.358342 systemd[1]: Started sshd@8-10.0.0.19:22-10.0.0.1:37890.service. May 15 00:47:39.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.19:22-10.0.0.1:37890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:39.390000 audit[2709]: USER_ACCT pid=2709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:39.391667 sshd[2709]: Accepted publickey for core from 10.0.0.1 port 37890 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:47:39.391000 audit[2709]: CRED_ACQ pid=2709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:39.391000 audit[2709]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3819a310 a2=3 a3=0 items=0 ppid=1 pid=2709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:39.391000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:47:39.392609 sshd[2709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:47:39.396969 systemd[1]: Started session-9.scope. May 15 00:47:39.398089 systemd-logind[1191]: New session 9 of user core. May 15 00:47:39.404000 audit[2709]: USER_START pid=2709 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:39.405000 audit[2711]: CRED_ACQ pid=2711 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:39.682751 sshd[2709]: pam_unix(sshd:session): session closed for user core May 15 00:47:39.682000 audit[2709]: USER_END pid=2709 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:39.682000 audit[2709]: CRED_DISP pid=2709 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:39.685634 systemd[1]: sshd@8-10.0.0.19:22-10.0.0.1:37890.service: Deactivated successfully. May 15 00:47:39.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.19:22-10.0.0.1:37890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:39.686357 systemd[1]: session-9.scope: Deactivated successfully. May 15 00:47:39.687050 systemd-logind[1191]: Session 9 logged out. Waiting for processes to exit. May 15 00:47:39.687682 systemd-logind[1191]: Removed session 9. May 15 00:47:40.397127 kubelet[2048]: E0515 00:47:40.397068 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjf4x" podUID="e18a49a0-35d4-453b-952b-0a4f021f03ad" May 15 00:47:40.468996 kubelet[2048]: I0515 00:47:40.468953 2048 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 00:47:40.469572 kubelet[2048]: E0515 00:47:40.469545 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:40.486897 kubelet[2048]: I0515 00:47:40.486835 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-688d56fbf6-4cll7" podStartSLOduration=5.522897379 podStartE2EDuration="10.486821453s" podCreationTimestamp="2025-05-15 00:47:30 +0000 UTC" firstStartedPulling="2025-05-15 00:47:30.86299546 +0000 UTC m=+22.567339088" lastFinishedPulling="2025-05-15 00:47:35.826919525 +0000 UTC m=+27.531263162" observedRunningTime="2025-05-15 00:47:36.457941494 +0000 UTC m=+28.162285131" watchObservedRunningTime="2025-05-15 00:47:40.486821453 +0000 UTC m=+32.191165080" May 15 00:47:40.502000 audit[2723]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:40.502000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffea3781b00 a2=0 a3=7ffea3781aec items=0 ppid=2247 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:40.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:40.508000 audit[2723]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:40.508000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffea3781b00 a2=0 a3=7ffea3781aec items=0 ppid=2247 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:40.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:41.481502 kubelet[2048]: E0515 00:47:41.481470 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:42.068925 env[1207]: time="2025-05-15T00:47:42.068860288Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:42.070523 env[1207]: time="2025-05-15T00:47:42.070496786Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:42.072012 env[1207]: time="2025-05-15T00:47:42.071976700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:42.073513 env[1207]: time="2025-05-15T00:47:42.073486831Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:42.073922 env[1207]: time="2025-05-15T00:47:42.073888156Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 00:47:42.075973 env[1207]: time="2025-05-15T00:47:42.075932563Z" level=info msg="CreateContainer within sandbox \"cd847c1a37c895c23d1473b32a0145b5b5c17508f62c8a49633b058e78ca3862\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 00:47:42.089759 env[1207]: time="2025-05-15T00:47:42.089705525Z" level=info msg="CreateContainer within sandbox \"cd847c1a37c895c23d1473b32a0145b5b5c17508f62c8a49633b058e78ca3862\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d9ca2f41594ee1000b4556a318db65b929ab48eb2852c2374f8f35dd62e5930e\"" May 15 00:47:42.090188 env[1207]: time="2025-05-15T00:47:42.090166201Z" level=info msg="StartContainer for \"d9ca2f41594ee1000b4556a318db65b929ab48eb2852c2374f8f35dd62e5930e\"" May 15 00:47:42.110469 systemd[1]: Started cri-containerd-d9ca2f41594ee1000b4556a318db65b929ab48eb2852c2374f8f35dd62e5930e.scope. May 15 00:47:42.122000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.124417 kernel: kauditd_printk_skb: 64 callbacks suppressed May 15 00:47:42.124490 kernel: audit: type=1400 audit(1747270062.122:998): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.122000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd0dc35c448 items=0 ppid=2514 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:42.133674 kernel: audit: type=1300 audit(1747270062.122:998): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd0dc35c448 items=0 ppid=2514 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:42.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439636132663431353934656531303030623435353661333138646236 May 15 00:47:42.140778 kernel: audit: type=1327 audit(1747270062.122:998): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439636132663431353934656531303030623435353661333138646236 May 15 00:47:42.122000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.144611 kernel: audit: type=1400 audit(1747270062.122:999): avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.122000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.148392 kernel: audit: type=1400 audit(1747270062.122:999): avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.122000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.152040 kernel: audit: type=1400 audit(1747270062.122:999): avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.122000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.155755 kernel: audit: type=1400 audit(1747270062.122:999): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.155809 kernel: audit: type=1400 audit(1747270062.122:999): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.122000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.122000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.163397 kernel: audit: type=1400 audit(1747270062.122:999): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.163495 kernel: audit: type=1400 audit(1747270062.122:999): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.122000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.122000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.122000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.122000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.122000 audit: BPF prog-id=133 op=LOAD May 15 00:47:42.122000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002363d8 items=0 ppid=2514 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:42.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439636132663431353934656531303030623435353661333138646236 May 15 00:47:42.127000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.127000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.127000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.127000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.127000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.127000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.127000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.127000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.127000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.127000 audit: BPF prog-id=134 op=LOAD May 15 00:47:42.127000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000236428 items=0 ppid=2514 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:42.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439636132663431353934656531303030623435353661333138646236 May 15 00:47:42.132000 audit: BPF prog-id=134 op=UNLOAD May 15 00:47:42.132000 audit: BPF prog-id=133 op=UNLOAD May 15 00:47:42.132000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.132000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.132000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.132000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.132000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.132000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.132000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.132000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.132000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.132000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:42.132000 audit: BPF prog-id=135 op=LOAD May 15 00:47:42.132000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002364b8 items=0 ppid=2514 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:42.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439636132663431353934656531303030623435353661333138646236 May 15 00:47:42.278168 env[1207]: time="2025-05-15T00:47:42.278094527Z" level=info msg="StartContainer for \"d9ca2f41594ee1000b4556a318db65b929ab48eb2852c2374f8f35dd62e5930e\" returns successfully" May 15 00:47:42.391368 kubelet[2048]: E0515 00:47:42.391250 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjf4x" podUID="e18a49a0-35d4-453b-952b-0a4f021f03ad" May 15 00:47:42.487504 kubelet[2048]: E0515 00:47:42.487478 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:43.019083 env[1207]: time="2025-05-15T00:47:43.019016911Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 00:47:43.020546 systemd[1]: cri-containerd-d9ca2f41594ee1000b4556a318db65b929ab48eb2852c2374f8f35dd62e5930e.scope: Deactivated successfully. May 15 00:47:43.024000 audit: BPF prog-id=135 op=UNLOAD May 15 00:47:43.036860 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d9ca2f41594ee1000b4556a318db65b929ab48eb2852c2374f8f35dd62e5930e-rootfs.mount: Deactivated successfully. May 15 00:47:43.046735 env[1207]: time="2025-05-15T00:47:43.046680668Z" level=info msg="shim disconnected" id=d9ca2f41594ee1000b4556a318db65b929ab48eb2852c2374f8f35dd62e5930e May 15 00:47:43.046837 env[1207]: time="2025-05-15T00:47:43.046745180Z" level=warning msg="cleaning up after shim disconnected" id=d9ca2f41594ee1000b4556a318db65b929ab48eb2852c2374f8f35dd62e5930e namespace=k8s.io May 15 00:47:43.046837 env[1207]: time="2025-05-15T00:47:43.046757443Z" level=info msg="cleaning up dead shim" May 15 00:47:43.052953 env[1207]: time="2025-05-15T00:47:43.052913312Z" level=warning msg="cleanup warnings time=\"2025-05-15T00:47:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2773 runtime=io.containerd.runc.v2\n" May 15 00:47:43.075558 kubelet[2048]: I0515 00:47:43.075528 2048 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 15 00:47:43.094476 kubelet[2048]: I0515 00:47:43.094432 2048 topology_manager.go:215] "Topology Admit Handler" podUID="19401807-1069-4dc0-9325-63f461c2adfa" podNamespace="kube-system" podName="coredns-7db6d8ff4d-5xvdh" May 15 00:47:43.096974 kubelet[2048]: I0515 00:47:43.096403 2048 topology_manager.go:215] "Topology Admit Handler" podUID="3b5565d8-a2c6-4be6-a224-b5f9a83d4786" podNamespace="calico-apiserver" podName="calico-apiserver-789d76996-w2bm7" May 15 00:47:43.099041 kubelet[2048]: I0515 00:47:43.099010 2048 topology_manager.go:215] "Topology Admit Handler" podUID="378dde4c-1f84-4b06-8c25-00678d54c37b" podNamespace="kube-system" podName="coredns-7db6d8ff4d-ddhvw" May 15 00:47:43.099183 kubelet[2048]: I0515 00:47:43.099165 2048 topology_manager.go:215] "Topology Admit Handler" podUID="05f35d15-5b08-4df6-bd81-0d251d912643" podNamespace="calico-apiserver" podName="calico-apiserver-789d76996-zb2pp" May 15 00:47:43.099295 kubelet[2048]: I0515 00:47:43.099279 2048 topology_manager.go:215] "Topology Admit Handler" podUID="5781e7f0-4915-430d-8593-cc1b96c9c3c4" podNamespace="calico-system" podName="calico-kube-controllers-7df9b79fbf-pdk5w" May 15 00:47:43.104277 systemd[1]: Created slice kubepods-besteffort-pod3b5565d8_a2c6_4be6_a224_b5f9a83d4786.slice. May 15 00:47:43.105276 kubelet[2048]: I0515 00:47:43.105057 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-45bzc\" (UniqueName: \"kubernetes.io/projected/378dde4c-1f84-4b06-8c25-00678d54c37b-kube-api-access-45bzc\") pod \"coredns-7db6d8ff4d-ddhvw\" (UID: \"378dde4c-1f84-4b06-8c25-00678d54c37b\") " pod="kube-system/coredns-7db6d8ff4d-ddhvw" May 15 00:47:43.105276 kubelet[2048]: I0515 00:47:43.105097 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5781e7f0-4915-430d-8593-cc1b96c9c3c4-tigera-ca-bundle\") pod \"calico-kube-controllers-7df9b79fbf-pdk5w\" (UID: \"5781e7f0-4915-430d-8593-cc1b96c9c3c4\") " pod="calico-system/calico-kube-controllers-7df9b79fbf-pdk5w" May 15 00:47:43.105276 kubelet[2048]: I0515 00:47:43.105116 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7fc72\" (UniqueName: \"kubernetes.io/projected/05f35d15-5b08-4df6-bd81-0d251d912643-kube-api-access-7fc72\") pod \"calico-apiserver-789d76996-zb2pp\" (UID: \"05f35d15-5b08-4df6-bd81-0d251d912643\") " pod="calico-apiserver/calico-apiserver-789d76996-zb2pp" May 15 00:47:43.105276 kubelet[2048]: I0515 00:47:43.105135 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qw95c\" (UniqueName: \"kubernetes.io/projected/19401807-1069-4dc0-9325-63f461c2adfa-kube-api-access-qw95c\") pod \"coredns-7db6d8ff4d-5xvdh\" (UID: \"19401807-1069-4dc0-9325-63f461c2adfa\") " pod="kube-system/coredns-7db6d8ff4d-5xvdh" May 15 00:47:43.105276 kubelet[2048]: I0515 00:47:43.105161 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/378dde4c-1f84-4b06-8c25-00678d54c37b-config-volume\") pod \"coredns-7db6d8ff4d-ddhvw\" (UID: \"378dde4c-1f84-4b06-8c25-00678d54c37b\") " pod="kube-system/coredns-7db6d8ff4d-ddhvw" May 15 00:47:43.105512 kubelet[2048]: I0515 00:47:43.105192 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/3b5565d8-a2c6-4be6-a224-b5f9a83d4786-calico-apiserver-certs\") pod \"calico-apiserver-789d76996-w2bm7\" (UID: \"3b5565d8-a2c6-4be6-a224-b5f9a83d4786\") " pod="calico-apiserver/calico-apiserver-789d76996-w2bm7" May 15 00:47:43.105512 kubelet[2048]: I0515 00:47:43.105332 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w4h7h\" (UniqueName: \"kubernetes.io/projected/3b5565d8-a2c6-4be6-a224-b5f9a83d4786-kube-api-access-w4h7h\") pod \"calico-apiserver-789d76996-w2bm7\" (UID: \"3b5565d8-a2c6-4be6-a224-b5f9a83d4786\") " pod="calico-apiserver/calico-apiserver-789d76996-w2bm7" May 15 00:47:43.105512 kubelet[2048]: I0515 00:47:43.105394 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/19401807-1069-4dc0-9325-63f461c2adfa-config-volume\") pod \"coredns-7db6d8ff4d-5xvdh\" (UID: \"19401807-1069-4dc0-9325-63f461c2adfa\") " pod="kube-system/coredns-7db6d8ff4d-5xvdh" May 15 00:47:43.105512 kubelet[2048]: I0515 00:47:43.105480 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8r8zk\" (UniqueName: \"kubernetes.io/projected/5781e7f0-4915-430d-8593-cc1b96c9c3c4-kube-api-access-8r8zk\") pod \"calico-kube-controllers-7df9b79fbf-pdk5w\" (UID: \"5781e7f0-4915-430d-8593-cc1b96c9c3c4\") " pod="calico-system/calico-kube-controllers-7df9b79fbf-pdk5w" May 15 00:47:43.105512 kubelet[2048]: I0515 00:47:43.105511 2048 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/05f35d15-5b08-4df6-bd81-0d251d912643-calico-apiserver-certs\") pod \"calico-apiserver-789d76996-zb2pp\" (UID: \"05f35d15-5b08-4df6-bd81-0d251d912643\") " pod="calico-apiserver/calico-apiserver-789d76996-zb2pp" May 15 00:47:43.109957 systemd[1]: Created slice kubepods-burstable-pod19401807_1069_4dc0_9325_63f461c2adfa.slice. May 15 00:47:43.113893 systemd[1]: Created slice kubepods-besteffort-pod5781e7f0_4915_430d_8593_cc1b96c9c3c4.slice. May 15 00:47:43.121295 systemd[1]: Created slice kubepods-burstable-pod378dde4c_1f84_4b06_8c25_00678d54c37b.slice. May 15 00:47:43.126050 systemd[1]: Created slice kubepods-besteffort-pod05f35d15_5b08_4df6_bd81_0d251d912643.slice. May 15 00:47:43.408959 env[1207]: time="2025-05-15T00:47:43.408853292Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789d76996-w2bm7,Uid:3b5565d8-a2c6-4be6-a224-b5f9a83d4786,Namespace:calico-apiserver,Attempt:0,}" May 15 00:47:43.413163 kubelet[2048]: E0515 00:47:43.413138 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:43.413615 env[1207]: time="2025-05-15T00:47:43.413574273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5xvdh,Uid:19401807-1069-4dc0-9325-63f461c2adfa,Namespace:kube-system,Attempt:0,}" May 15 00:47:43.418693 env[1207]: time="2025-05-15T00:47:43.418662755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7df9b79fbf-pdk5w,Uid:5781e7f0-4915-430d-8593-cc1b96c9c3c4,Namespace:calico-system,Attempt:0,}" May 15 00:47:43.427739 kubelet[2048]: E0515 00:47:43.423853 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:43.430564 env[1207]: time="2025-05-15T00:47:43.430518977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789d76996-zb2pp,Uid:05f35d15-5b08-4df6-bd81-0d251d912643,Namespace:calico-apiserver,Attempt:0,}" May 15 00:47:43.430823 env[1207]: time="2025-05-15T00:47:43.430785548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-ddhvw,Uid:378dde4c-1f84-4b06-8c25-00678d54c37b,Namespace:kube-system,Attempt:0,}" May 15 00:47:43.493704 kubelet[2048]: E0515 00:47:43.492830 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:43.502431 env[1207]: time="2025-05-15T00:47:43.502370354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 00:47:43.525433 env[1207]: time="2025-05-15T00:47:43.525348718Z" level=error msg="Failed to destroy network for sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.525728 env[1207]: time="2025-05-15T00:47:43.525694219Z" level=error msg="encountered an error cleaning up failed sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.525781 env[1207]: time="2025-05-15T00:47:43.525743571Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789d76996-w2bm7,Uid:3b5565d8-a2c6-4be6-a224-b5f9a83d4786,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.526914 kubelet[2048]: E0515 00:47:43.525984 2048 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.526914 kubelet[2048]: E0515 00:47:43.526087 2048 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-789d76996-w2bm7" May 15 00:47:43.526914 kubelet[2048]: E0515 00:47:43.526110 2048 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-789d76996-w2bm7" May 15 00:47:43.527033 kubelet[2048]: E0515 00:47:43.526159 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-789d76996-w2bm7_calico-apiserver(3b5565d8-a2c6-4be6-a224-b5f9a83d4786)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-789d76996-w2bm7_calico-apiserver(3b5565d8-a2c6-4be6-a224-b5f9a83d4786)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-789d76996-w2bm7" podUID="3b5565d8-a2c6-4be6-a224-b5f9a83d4786" May 15 00:47:43.535306 env[1207]: time="2025-05-15T00:47:43.535232761Z" level=error msg="Failed to destroy network for sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.535579 env[1207]: time="2025-05-15T00:47:43.535548455Z" level=error msg="encountered an error cleaning up failed sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.535641 env[1207]: time="2025-05-15T00:47:43.535601194Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-ddhvw,Uid:378dde4c-1f84-4b06-8c25-00678d54c37b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.535926 kubelet[2048]: E0515 00:47:43.535842 2048 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.535985 kubelet[2048]: E0515 00:47:43.535952 2048 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-ddhvw" May 15 00:47:43.535985 kubelet[2048]: E0515 00:47:43.535974 2048 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-ddhvw" May 15 00:47:43.537154 kubelet[2048]: E0515 00:47:43.536293 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-ddhvw_kube-system(378dde4c-1f84-4b06-8c25-00678d54c37b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-ddhvw_kube-system(378dde4c-1f84-4b06-8c25-00678d54c37b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-ddhvw" podUID="378dde4c-1f84-4b06-8c25-00678d54c37b" May 15 00:47:43.546694 env[1207]: time="2025-05-15T00:47:43.546641993Z" level=error msg="Failed to destroy network for sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.547132 env[1207]: time="2025-05-15T00:47:43.547092130Z" level=error msg="encountered an error cleaning up failed sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.547201 env[1207]: time="2025-05-15T00:47:43.547141904Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789d76996-zb2pp,Uid:05f35d15-5b08-4df6-bd81-0d251d912643,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.547434 kubelet[2048]: E0515 00:47:43.547393 2048 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.547483 kubelet[2048]: E0515 00:47:43.547463 2048 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-789d76996-zb2pp" May 15 00:47:43.547519 kubelet[2048]: E0515 00:47:43.547482 2048 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-789d76996-zb2pp" May 15 00:47:43.547566 kubelet[2048]: E0515 00:47:43.547538 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-789d76996-zb2pp_calico-apiserver(05f35d15-5b08-4df6-bd81-0d251d912643)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-789d76996-zb2pp_calico-apiserver(05f35d15-5b08-4df6-bd81-0d251d912643)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-789d76996-zb2pp" podUID="05f35d15-5b08-4df6-bd81-0d251d912643" May 15 00:47:43.550914 env[1207]: time="2025-05-15T00:47:43.550870216Z" level=error msg="Failed to destroy network for sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.551206 env[1207]: time="2025-05-15T00:47:43.551166054Z" level=error msg="encountered an error cleaning up failed sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.551255 env[1207]: time="2025-05-15T00:47:43.551215917Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5xvdh,Uid:19401807-1069-4dc0-9325-63f461c2adfa,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.551429 kubelet[2048]: E0515 00:47:43.551388 2048 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.551480 kubelet[2048]: E0515 00:47:43.551437 2048 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-5xvdh" May 15 00:47:43.551480 kubelet[2048]: E0515 00:47:43.551454 2048 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-5xvdh" May 15 00:47:43.551528 kubelet[2048]: E0515 00:47:43.551487 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-5xvdh_kube-system(19401807-1069-4dc0-9325-63f461c2adfa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-5xvdh_kube-system(19401807-1069-4dc0-9325-63f461c2adfa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-5xvdh" podUID="19401807-1069-4dc0-9325-63f461c2adfa" May 15 00:47:43.557908 env[1207]: time="2025-05-15T00:47:43.557864223Z" level=error msg="Failed to destroy network for sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.558153 env[1207]: time="2025-05-15T00:47:43.558124182Z" level=error msg="encountered an error cleaning up failed sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.558186 env[1207]: time="2025-05-15T00:47:43.558169056Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7df9b79fbf-pdk5w,Uid:5781e7f0-4915-430d-8593-cc1b96c9c3c4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.558397 kubelet[2048]: E0515 00:47:43.558363 2048 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:43.558460 kubelet[2048]: E0515 00:47:43.558413 2048 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7df9b79fbf-pdk5w" May 15 00:47:43.558460 kubelet[2048]: E0515 00:47:43.558436 2048 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7df9b79fbf-pdk5w" May 15 00:47:43.558517 kubelet[2048]: E0515 00:47:43.558480 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7df9b79fbf-pdk5w_calico-system(5781e7f0-4915-430d-8593-cc1b96c9c3c4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7df9b79fbf-pdk5w_calico-system(5781e7f0-4915-430d-8593-cc1b96c9c3c4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7df9b79fbf-pdk5w" podUID="5781e7f0-4915-430d-8593-cc1b96c9c3c4" May 15 00:47:44.214527 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145-shm.mount: Deactivated successfully. May 15 00:47:44.400069 systemd[1]: Created slice kubepods-besteffort-pode18a49a0_35d4_453b_952b_0a4f021f03ad.slice. May 15 00:47:44.401750 env[1207]: time="2025-05-15T00:47:44.401698540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gjf4x,Uid:e18a49a0-35d4-453b-952b-0a4f021f03ad,Namespace:calico-system,Attempt:0,}" May 15 00:47:44.495941 kubelet[2048]: I0515 00:47:44.495586 2048 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:47:44.496338 env[1207]: time="2025-05-15T00:47:44.496301188Z" level=info msg="StopPodSandbox for \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\"" May 15 00:47:44.496718 kubelet[2048]: I0515 00:47:44.496328 2048 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:47:44.496862 env[1207]: time="2025-05-15T00:47:44.496820235Z" level=info msg="StopPodSandbox for \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\"" May 15 00:47:44.497209 kubelet[2048]: I0515 00:47:44.497187 2048 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:47:44.497674 env[1207]: time="2025-05-15T00:47:44.497650726Z" level=info msg="StopPodSandbox for \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\"" May 15 00:47:44.499259 kubelet[2048]: I0515 00:47:44.499218 2048 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:47:44.500683 kubelet[2048]: I0515 00:47:44.500654 2048 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:47:44.501006 env[1207]: time="2025-05-15T00:47:44.500936917Z" level=info msg="StopPodSandbox for \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\"" May 15 00:47:44.501402 env[1207]: time="2025-05-15T00:47:44.501206845Z" level=info msg="StopPodSandbox for \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\"" May 15 00:47:44.526916 env[1207]: time="2025-05-15T00:47:44.526843993Z" level=error msg="StopPodSandbox for \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\" failed" error="failed to destroy network for sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:44.527138 kubelet[2048]: E0515 00:47:44.527096 2048 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:47:44.527217 kubelet[2048]: E0515 00:47:44.527157 2048 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0"} May 15 00:47:44.527294 kubelet[2048]: E0515 00:47:44.527229 2048 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"19401807-1069-4dc0-9325-63f461c2adfa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:47:44.527375 kubelet[2048]: E0515 00:47:44.527301 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"19401807-1069-4dc0-9325-63f461c2adfa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-5xvdh" podUID="19401807-1069-4dc0-9325-63f461c2adfa" May 15 00:47:44.539096 env[1207]: time="2025-05-15T00:47:44.539033018Z" level=error msg="StopPodSandbox for \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\" failed" error="failed to destroy network for sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:44.539282 kubelet[2048]: E0515 00:47:44.539253 2048 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:47:44.539339 kubelet[2048]: E0515 00:47:44.539290 2048 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466"} May 15 00:47:44.539364 kubelet[2048]: E0515 00:47:44.539344 2048 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"378dde4c-1f84-4b06-8c25-00678d54c37b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:47:44.539419 kubelet[2048]: E0515 00:47:44.539369 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"378dde4c-1f84-4b06-8c25-00678d54c37b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-ddhvw" podUID="378dde4c-1f84-4b06-8c25-00678d54c37b" May 15 00:47:44.552477 env[1207]: time="2025-05-15T00:47:44.552416679Z" level=error msg="StopPodSandbox for \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\" failed" error="failed to destroy network for sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:44.552938 kubelet[2048]: E0515 00:47:44.552887 2048 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:47:44.553050 kubelet[2048]: E0515 00:47:44.552940 2048 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145"} May 15 00:47:44.553050 kubelet[2048]: E0515 00:47:44.552974 2048 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3b5565d8-a2c6-4be6-a224-b5f9a83d4786\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:47:44.553050 kubelet[2048]: E0515 00:47:44.552998 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3b5565d8-a2c6-4be6-a224-b5f9a83d4786\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-789d76996-w2bm7" podUID="3b5565d8-a2c6-4be6-a224-b5f9a83d4786" May 15 00:47:44.553528 env[1207]: time="2025-05-15T00:47:44.553468167Z" level=error msg="StopPodSandbox for \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\" failed" error="failed to destroy network for sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:44.553683 kubelet[2048]: E0515 00:47:44.553645 2048 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:47:44.553683 kubelet[2048]: E0515 00:47:44.553682 2048 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18"} May 15 00:47:44.553800 kubelet[2048]: E0515 00:47:44.553711 2048 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"05f35d15-5b08-4df6-bd81-0d251d912643\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:47:44.553800 kubelet[2048]: E0515 00:47:44.553727 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"05f35d15-5b08-4df6-bd81-0d251d912643\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-789d76996-zb2pp" podUID="05f35d15-5b08-4df6-bd81-0d251d912643" May 15 00:47:44.563612 env[1207]: time="2025-05-15T00:47:44.563541222Z" level=error msg="StopPodSandbox for \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\" failed" error="failed to destroy network for sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:44.563848 kubelet[2048]: E0515 00:47:44.563818 2048 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:47:44.563916 kubelet[2048]: E0515 00:47:44.563853 2048 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2"} May 15 00:47:44.563916 kubelet[2048]: E0515 00:47:44.563882 2048 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5781e7f0-4915-430d-8593-cc1b96c9c3c4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:47:44.563916 kubelet[2048]: E0515 00:47:44.563901 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5781e7f0-4915-430d-8593-cc1b96c9c3c4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7df9b79fbf-pdk5w" podUID="5781e7f0-4915-430d-8593-cc1b96c9c3c4" May 15 00:47:44.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.19:22-10.0.0.1:37894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:44.687055 systemd[1]: Started sshd@9-10.0.0.19:22-10.0.0.1:37894.service. May 15 00:47:44.688560 env[1207]: time="2025-05-15T00:47:44.688510312Z" level=error msg="Failed to destroy network for sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:44.688940 env[1207]: time="2025-05-15T00:47:44.688904654Z" level=error msg="encountered an error cleaning up failed sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:44.689039 env[1207]: time="2025-05-15T00:47:44.688967061Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gjf4x,Uid:e18a49a0-35d4-453b-952b-0a4f021f03ad,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:44.689390 kubelet[2048]: E0515 00:47:44.689227 2048 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:44.689390 kubelet[2048]: E0515 00:47:44.689312 2048 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gjf4x" May 15 00:47:44.689390 kubelet[2048]: E0515 00:47:44.689334 2048 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gjf4x" May 15 00:47:44.689539 kubelet[2048]: E0515 00:47:44.689377 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-gjf4x_calico-system(e18a49a0-35d4-453b-952b-0a4f021f03ad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-gjf4x_calico-system(e18a49a0-35d4-453b-952b-0a4f021f03ad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gjf4x" podUID="e18a49a0-35d4-453b-952b-0a4f021f03ad" May 15 00:47:44.691856 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919-shm.mount: Deactivated successfully. May 15 00:47:44.719000 audit[3146]: USER_ACCT pid=3146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:44.720859 sshd[3146]: Accepted publickey for core from 10.0.0.1 port 37894 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:47:44.720000 audit[3146]: CRED_ACQ pid=3146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:44.720000 audit[3146]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc357aa020 a2=3 a3=0 items=0 ppid=1 pid=3146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:44.720000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:47:44.722130 sshd[3146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:47:44.725825 systemd-logind[1191]: New session 10 of user core. May 15 00:47:44.726727 systemd[1]: Started session-10.scope. May 15 00:47:44.729000 audit[3146]: USER_START pid=3146 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:44.730000 audit[3148]: CRED_ACQ pid=3148 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:44.833643 sshd[3146]: pam_unix(sshd:session): session closed for user core May 15 00:47:44.833000 audit[3146]: USER_END pid=3146 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:44.833000 audit[3146]: CRED_DISP pid=3146 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:44.836181 systemd[1]: sshd@9-10.0.0.19:22-10.0.0.1:37894.service: Deactivated successfully. May 15 00:47:44.836881 systemd[1]: session-10.scope: Deactivated successfully. May 15 00:47:44.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.19:22-10.0.0.1:37894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:44.837491 systemd-logind[1191]: Session 10 logged out. Waiting for processes to exit. May 15 00:47:44.838427 systemd-logind[1191]: Removed session 10. May 15 00:47:45.502810 kubelet[2048]: I0515 00:47:45.502781 2048 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:47:45.503385 env[1207]: time="2025-05-15T00:47:45.503339924Z" level=info msg="StopPodSandbox for \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\"" May 15 00:47:45.532664 env[1207]: time="2025-05-15T00:47:45.532600489Z" level=error msg="StopPodSandbox for \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\" failed" error="failed to destroy network for sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 00:47:45.532933 kubelet[2048]: E0515 00:47:45.532875 2048 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:47:45.532978 kubelet[2048]: E0515 00:47:45.532941 2048 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919"} May 15 00:47:45.533032 kubelet[2048]: E0515 00:47:45.532976 2048 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e18a49a0-35d4-453b-952b-0a4f021f03ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 00:47:45.533032 kubelet[2048]: E0515 00:47:45.533002 2048 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e18a49a0-35d4-453b-952b-0a4f021f03ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gjf4x" podUID="e18a49a0-35d4-453b-952b-0a4f021f03ad" May 15 00:47:49.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.19:22-10.0.0.1:36814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:49.837993 systemd[1]: Started sshd@10-10.0.0.19:22-10.0.0.1:36814.service. May 15 00:47:49.839153 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 00:47:49.839201 kernel: audit: type=1130 audit(1747270069.836:1014): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.19:22-10.0.0.1:36814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:49.868000 audit[3185]: USER_ACCT pid=3185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:49.872000 audit[3185]: CRED_ACQ pid=3185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:49.873889 sshd[3185]: Accepted publickey for core from 10.0.0.1 port 36814 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:47:49.874133 sshd[3185]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:47:49.874281 kernel: audit: type=1101 audit(1747270069.868:1015): pid=3185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:49.874311 kernel: audit: type=1103 audit(1747270069.872:1016): pid=3185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:49.884145 kernel: audit: type=1006 audit(1747270069.872:1017): pid=3185 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 15 00:47:49.884268 kernel: audit: type=1300 audit(1747270069.872:1017): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd984550e0 a2=3 a3=0 items=0 ppid=1 pid=3185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:49.872000 audit[3185]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd984550e0 a2=3 a3=0 items=0 ppid=1 pid=3185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:49.878383 systemd[1]: Started session-11.scope. May 15 00:47:49.878663 systemd-logind[1191]: New session 11 of user core. May 15 00:47:49.872000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:47:49.881000 audit[3185]: USER_START pid=3185 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:49.890222 kernel: audit: type=1327 audit(1747270069.872:1017): proctitle=737368643A20636F7265205B707269765D May 15 00:47:49.890329 kernel: audit: type=1105 audit(1747270069.881:1018): pid=3185 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:49.890351 kernel: audit: type=1103 audit(1747270069.882:1019): pid=3187 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:49.882000 audit[3187]: CRED_ACQ pid=3187 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:49.995209 sshd[3185]: pam_unix(sshd:session): session closed for user core May 15 00:47:49.999119 systemd[1]: Started sshd@11-10.0.0.19:22-10.0.0.1:36828.service. May 15 00:47:49.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.19:22-10.0.0.1:36828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:50.001888 systemd[1]: sshd@10-10.0.0.19:22-10.0.0.1:36814.service: Deactivated successfully. May 15 00:47:50.002455 systemd[1]: session-11.scope: Deactivated successfully. May 15 00:47:50.003322 kernel: audit: type=1130 audit(1747270069.998:1020): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.19:22-10.0.0.1:36828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:50.003437 systemd-logind[1191]: Session 11 logged out. Waiting for processes to exit. May 15 00:47:50.004229 systemd-logind[1191]: Removed session 11. May 15 00:47:49.999000 audit[3185]: USER_END pid=3185 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:49.999000 audit[3185]: CRED_DISP pid=3185 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.19:22-10.0.0.1:36814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:50.010515 kernel: audit: type=1106 audit(1747270069.999:1021): pid=3185 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.035000 audit[3198]: USER_ACCT pid=3198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.037092 sshd[3198]: Accepted publickey for core from 10.0.0.1 port 36828 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:47:50.036000 audit[3198]: CRED_ACQ pid=3198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.036000 audit[3198]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb5bd34c0 a2=3 a3=0 items=0 ppid=1 pid=3198 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:50.036000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:47:50.038131 sshd[3198]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:47:50.041545 systemd-logind[1191]: New session 12 of user core. May 15 00:47:50.042280 systemd[1]: Started session-12.scope. May 15 00:47:50.046000 audit[3198]: USER_START pid=3198 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.047000 audit[3201]: CRED_ACQ pid=3201 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.192911 sshd[3198]: pam_unix(sshd:session): session closed for user core May 15 00:47:50.196061 systemd[1]: Started sshd@12-10.0.0.19:22-10.0.0.1:36840.service. May 15 00:47:50.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.19:22-10.0.0.1:36840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:50.195000 audit[3198]: USER_END pid=3198 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.195000 audit[3198]: CRED_DISP pid=3198 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.201829 systemd-logind[1191]: Session 12 logged out. Waiting for processes to exit. May 15 00:47:50.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.19:22-10.0.0.1:36828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:50.203457 systemd[1]: sshd@11-10.0.0.19:22-10.0.0.1:36828.service: Deactivated successfully. May 15 00:47:50.204093 systemd[1]: session-12.scope: Deactivated successfully. May 15 00:47:50.205961 systemd-logind[1191]: Removed session 12. May 15 00:47:50.237000 audit[3210]: USER_ACCT pid=3210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.239317 sshd[3210]: Accepted publickey for core from 10.0.0.1 port 36840 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:47:50.238000 audit[3210]: CRED_ACQ pid=3210 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.239994 sshd[3210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:47:50.238000 audit[3210]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4db08410 a2=3 a3=0 items=0 ppid=1 pid=3210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:50.238000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:47:50.244213 systemd[1]: Started session-13.scope. May 15 00:47:50.245798 systemd-logind[1191]: New session 13 of user core. May 15 00:47:50.249000 audit[3210]: USER_START pid=3210 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.251000 audit[3213]: CRED_ACQ pid=3213 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.359203 sshd[3210]: pam_unix(sshd:session): session closed for user core May 15 00:47:50.359000 audit[3210]: USER_END pid=3210 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.359000 audit[3210]: CRED_DISP pid=3210 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:50.362167 systemd[1]: sshd@12-10.0.0.19:22-10.0.0.1:36840.service: Deactivated successfully. May 15 00:47:50.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.19:22-10.0.0.1:36840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:50.363003 systemd[1]: session-13.scope: Deactivated successfully. May 15 00:47:50.364051 systemd-logind[1191]: Session 13 logged out. Waiting for processes to exit. May 15 00:47:50.364925 systemd-logind[1191]: Removed session 13. May 15 00:47:53.045407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1766713341.mount: Deactivated successfully. May 15 00:47:54.117662 env[1207]: time="2025-05-15T00:47:54.117625625Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:54.120211 env[1207]: time="2025-05-15T00:47:54.120168433Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:54.122039 env[1207]: time="2025-05-15T00:47:54.122016755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:54.124063 env[1207]: time="2025-05-15T00:47:54.124022053Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:54.124366 env[1207]: time="2025-05-15T00:47:54.124333748Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 00:47:54.142399 env[1207]: time="2025-05-15T00:47:54.142362740Z" level=info msg="CreateContainer within sandbox \"cd847c1a37c895c23d1473b32a0145b5b5c17508f62c8a49633b058e78ca3862\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 00:47:54.165405 env[1207]: time="2025-05-15T00:47:54.165365464Z" level=info msg="CreateContainer within sandbox \"cd847c1a37c895c23d1473b32a0145b5b5c17508f62c8a49633b058e78ca3862\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"bf2a8207fc5636c49b8f127516d66d336c786201883fec7447081c6f9c428db8\"" May 15 00:47:54.166366 env[1207]: time="2025-05-15T00:47:54.166349444Z" level=info msg="StartContainer for \"bf2a8207fc5636c49b8f127516d66d336c786201883fec7447081c6f9c428db8\"" May 15 00:47:54.198699 systemd[1]: Started cri-containerd-bf2a8207fc5636c49b8f127516d66d336c786201883fec7447081c6f9c428db8.scope. May 15 00:47:54.214000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f9d7b7cbb68 items=0 ppid=2514 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:54.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266326138323037666335363336633439623866313237353136643636 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit: BPF prog-id=136 op=LOAD May 15 00:47:54.214000 audit[3234]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001b63e8 items=0 ppid=2514 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:54.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266326138323037666335363336633439623866313237353136643636 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.214000 audit: BPF prog-id=137 op=LOAD May 15 00:47:54.214000 audit[3234]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001b6438 items=0 ppid=2514 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:54.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266326138323037666335363336633439623866313237353136643636 May 15 00:47:54.215000 audit: BPF prog-id=137 op=UNLOAD May 15 00:47:54.215000 audit: BPF prog-id=136 op=UNLOAD May 15 00:47:54.215000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.215000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.215000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.215000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.215000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.215000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.215000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.215000 audit[3234]: AVC avc: denied { perfmon } for pid=3234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.215000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.215000 audit[3234]: AVC avc: denied { bpf } for pid=3234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:54.215000 audit: BPF prog-id=138 op=LOAD May 15 00:47:54.215000 audit[3234]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001b64c8 items=0 ppid=2514 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:54.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266326138323037666335363336633439623866313237353136643636 May 15 00:47:54.355099 env[1207]: time="2025-05-15T00:47:54.355041632Z" level=info msg="StartContainer for \"bf2a8207fc5636c49b8f127516d66d336c786201883fec7447081c6f9c428db8\" returns successfully" May 15 00:47:54.389687 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 00:47:54.389793 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 00:47:54.519886 kubelet[2048]: E0515 00:47:54.519855 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:55.363966 systemd[1]: Started sshd@13-10.0.0.19:22-10.0.0.1:36846.service. May 15 00:47:55.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.19:22-10.0.0.1:36846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:55.365060 kernel: kauditd_printk_skb: 66 callbacks suppressed May 15 00:47:55.365123 kernel: audit: type=1130 audit(1747270075.362:1047): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.19:22-10.0.0.1:36846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:55.391314 env[1207]: time="2025-05-15T00:47:55.391265363Z" level=info msg="StopPodSandbox for \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\"" May 15 00:47:55.391610 env[1207]: time="2025-05-15T00:47:55.391374238Z" level=info msg="StopPodSandbox for \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\"" May 15 00:47:55.393000 audit[3318]: USER_ACCT pid=3318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.398438 sshd[3318]: Accepted publickey for core from 10.0.0.1 port 36846 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:47:55.397000 audit[3318]: CRED_ACQ pid=3318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.399251 kernel: audit: type=1101 audit(1747270075.393:1048): pid=3318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.399287 kernel: audit: type=1103 audit(1747270075.397:1049): pid=3318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.399668 sshd[3318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:47:55.403285 systemd-logind[1191]: New session 14 of user core. May 15 00:47:55.403627 systemd[1]: Started session-14.scope. May 15 00:47:55.405276 kernel: audit: type=1006 audit(1747270075.397:1050): pid=3318 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 15 00:47:55.397000 audit[3318]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc011ed7b0 a2=3 a3=0 items=0 ppid=1 pid=3318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.411316 kernel: audit: type=1300 audit(1747270075.397:1050): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc011ed7b0 a2=3 a3=0 items=0 ppid=1 pid=3318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.413553 kernel: audit: type=1327 audit(1747270075.397:1050): proctitle=737368643A20636F7265205B707269765D May 15 00:47:55.397000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:47:55.410000 audit[3318]: USER_START pid=3318 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.412000 audit[3363]: CRED_ACQ pid=3363 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.422101 kernel: audit: type=1105 audit(1747270075.410:1051): pid=3318 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.422205 kernel: audit: type=1103 audit(1747270075.412:1052): pid=3363 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.454361 kubelet[2048]: I0515 00:47:55.454292 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vfrzp" podStartSLOduration=2.169366021 podStartE2EDuration="25.454273809s" podCreationTimestamp="2025-05-15 00:47:30 +0000 UTC" firstStartedPulling="2025-05-15 00:47:30.840482916 +0000 UTC m=+22.544826533" lastFinishedPulling="2025-05-15 00:47:54.125390694 +0000 UTC m=+45.829734321" observedRunningTime="2025-05-15 00:47:54.53491402 +0000 UTC m=+46.239257647" watchObservedRunningTime="2025-05-15 00:47:55.454273809 +0000 UTC m=+47.158617436" May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.453 [INFO][3354] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.453 [INFO][3354] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" iface="eth0" netns="/var/run/netns/cni-670d6eeb-6768-7669-9057-f411131d5417" May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.453 [INFO][3354] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" iface="eth0" netns="/var/run/netns/cni-670d6eeb-6768-7669-9057-f411131d5417" May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.455 [INFO][3354] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" iface="eth0" netns="/var/run/netns/cni-670d6eeb-6768-7669-9057-f411131d5417" May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.455 [INFO][3354] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.455 [INFO][3354] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.502 [INFO][3372] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" HandleID="k8s-pod-network.e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.503 [INFO][3372] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.503 [INFO][3372] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.508 [WARNING][3372] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" HandleID="k8s-pod-network.e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.508 [INFO][3372] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" HandleID="k8s-pod-network.e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.509 [INFO][3372] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:47:55.514428 env[1207]: 2025-05-15 00:47:55.512 [INFO][3354] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:47:55.517165 systemd[1]: run-netns-cni\x2d670d6eeb\x2d6768\x2d7669\x2d9057\x2df411131d5417.mount: Deactivated successfully. May 15 00:47:55.518393 env[1207]: time="2025-05-15T00:47:55.518338198Z" level=info msg="TearDown network for sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\" successfully" May 15 00:47:55.518459 env[1207]: time="2025-05-15T00:47:55.518392199Z" level=info msg="StopPodSandbox for \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\" returns successfully" May 15 00:47:55.520407 env[1207]: time="2025-05-15T00:47:55.519818479Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789d76996-w2bm7,Uid:3b5565d8-a2c6-4be6-a224-b5f9a83d4786,Namespace:calico-apiserver,Attempt:1,}" May 15 00:47:55.521518 kubelet[2048]: E0515 00:47:55.521486 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:55.528557 sshd[3318]: pam_unix(sshd:session): session closed for user core May 15 00:47:55.528000 audit[3318]: USER_END pid=3318 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.537060 kernel: audit: type=1106 audit(1747270075.528:1053): pid=3318 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.537145 kernel: audit: type=1104 audit(1747270075.533:1054): pid=3318 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.533000 audit[3318]: CRED_DISP pid=3318 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:47:55.535983 systemd[1]: sshd@13-10.0.0.19:22-10.0.0.1:36846.service: Deactivated successfully. May 15 00:47:55.536814 systemd[1]: session-14.scope: Deactivated successfully. May 15 00:47:55.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.19:22-10.0.0.1:36846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:47:55.542445 systemd-logind[1191]: Session 14 logged out. Waiting for processes to exit. May 15 00:47:55.543174 systemd[1]: run-containerd-runc-k8s.io-bf2a8207fc5636c49b8f127516d66d336c786201883fec7447081c6f9c428db8-runc.9qF2v6.mount: Deactivated successfully. May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.454 [INFO][3353] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.455 [INFO][3353] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" iface="eth0" netns="/var/run/netns/cni-c0b128a4-7d4a-8b09-1d70-f4f661b027c5" May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.455 [INFO][3353] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" iface="eth0" netns="/var/run/netns/cni-c0b128a4-7d4a-8b09-1d70-f4f661b027c5" May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.455 [INFO][3353] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" iface="eth0" netns="/var/run/netns/cni-c0b128a4-7d4a-8b09-1d70-f4f661b027c5" May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.455 [INFO][3353] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.455 [INFO][3353] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.502 [INFO][3371] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" HandleID="k8s-pod-network.46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.502 [INFO][3371] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.509 [INFO][3371] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.523 [WARNING][3371] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" HandleID="k8s-pod-network.46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.525 [INFO][3371] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" HandleID="k8s-pod-network.46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.528 [INFO][3371] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:47:55.544866 env[1207]: 2025-05-15 00:47:55.543 [INFO][3353] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:47:55.544866 env[1207]: time="2025-05-15T00:47:55.544734466Z" level=info msg="TearDown network for sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\" successfully" May 15 00:47:55.544866 env[1207]: time="2025-05-15T00:47:55.544763470Z" level=info msg="StopPodSandbox for \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\" returns successfully" May 15 00:47:55.545639 env[1207]: time="2025-05-15T00:47:55.545337689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789d76996-zb2pp,Uid:05f35d15-5b08-4df6-bd81-0d251d912643,Namespace:calico-apiserver,Attempt:1,}" May 15 00:47:55.545783 systemd-logind[1191]: Removed session 14. May 15 00:47:55.629000 audit[3518]: AVC avc: denied { write } for pid=3518 comm="tee" name="fd" dev="proc" ino=24311 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:47:55.629000 audit[3518]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3fc19a26 a2=241 a3=1b6 items=1 ppid=3442 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.629000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 00:47:55.629000 audit: PATH item=0 name="/dev/fd/63" inode=26826 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:47:55.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:47:55.638000 audit[3496]: AVC avc: denied { write } for pid=3496 comm="tee" name="fd" dev="proc" ino=25339 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:47:55.638000 audit[3496]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff57321a26 a2=241 a3=1b6 items=1 ppid=3448 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.638000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 00:47:55.638000 audit: PATH item=0 name="/dev/fd/63" inode=26823 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:47:55.638000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:47:55.641000 audit[3527]: AVC avc: denied { write } for pid=3527 comm="tee" name="fd" dev="proc" ino=25343 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:47:55.641000 audit[3527]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0cbe3a28 a2=241 a3=1b6 items=1 ppid=3431 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.641000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 00:47:55.641000 audit: PATH item=0 name="/dev/fd/63" inode=25799 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:47:55.641000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:47:55.645000 audit[3498]: AVC avc: denied { write } for pid=3498 comm="tee" name="fd" dev="proc" ino=25804 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:47:55.646000 audit[3503]: AVC avc: denied { write } for pid=3503 comm="tee" name="fd" dev="proc" ino=25807 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:47:55.646000 audit[3503]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc494c6a17 a2=241 a3=1b6 items=1 ppid=3433 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.646000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 00:47:55.646000 audit: PATH item=0 name="/dev/fd/63" inode=24298 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:47:55.646000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:47:55.645000 audit[3498]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7e0bfa27 a2=241 a3=1b6 items=1 ppid=3441 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.658000 audit[3530]: AVC avc: denied { write } for pid=3530 comm="tee" name="fd" dev="proc" ino=25812 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:47:55.645000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 00:47:55.645000 audit: PATH item=0 name="/dev/fd/63" inode=26824 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:47:55.645000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:47:55.658000 audit[3530]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf8c1ba16 a2=241 a3=1b6 items=1 ppid=3440 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.658000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 00:47:55.658000 audit: PATH item=0 name="/dev/fd/63" inode=26828 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:47:55.658000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:47:55.684000 audit[3543]: AVC avc: denied { write } for pid=3543 comm="tee" name="fd" dev="proc" ino=24322 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 00:47:55.684000 audit[3543]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe66756a26 a2=241 a3=1b6 items=1 ppid=3439 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.684000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 00:47:55.684000 audit: PATH item=0 name="/dev/fd/63" inode=25801 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 00:47:55.684000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 00:47:55.722816 systemd-networkd[1025]: calidad0251099e: Link UP May 15 00:47:55.730986 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:47:55.733036 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidad0251099e: link becomes ready May 15 00:47:55.732306 systemd-networkd[1025]: calidad0251099e: Gained carrier May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.577 [INFO][3404] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.593 [INFO][3404] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0 calico-apiserver-789d76996- calico-apiserver 3b5565d8-a2c6-4be6-a224-b5f9a83d4786 901 0 2025-05-15 00:47:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:789d76996 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-789d76996-w2bm7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calidad0251099e [] []}} ContainerID="0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-w2bm7" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--w2bm7-" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.593 [INFO][3404] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-w2bm7" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.638 [INFO][3509] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" HandleID="k8s-pod-network.0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.646 [INFO][3509] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" HandleID="k8s-pod-network.0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051ca0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-789d76996-w2bm7", "timestamp":"2025-05-15 00:47:55.638614185 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.646 [INFO][3509] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.646 [INFO][3509] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.647 [INFO][3509] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.648 [INFO][3509] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" host="localhost" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.653 [INFO][3509] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.659 [INFO][3509] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.660 [INFO][3509] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.662 [INFO][3509] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.662 [INFO][3509] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" host="localhost" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.663 [INFO][3509] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33 May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.672 [INFO][3509] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" host="localhost" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.699 [INFO][3509] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" host="localhost" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.699 [INFO][3509] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" host="localhost" May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.699 [INFO][3509] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:47:55.755382 env[1207]: 2025-05-15 00:47:55.699 [INFO][3509] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" HandleID="k8s-pod-network.0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:47:55.756062 env[1207]: 2025-05-15 00:47:55.702 [INFO][3404] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-w2bm7" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0", GenerateName:"calico-apiserver-789d76996-", Namespace:"calico-apiserver", SelfLink:"", UID:"3b5565d8-a2c6-4be6-a224-b5f9a83d4786", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789d76996", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-789d76996-w2bm7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidad0251099e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:47:55.756062 env[1207]: 2025-05-15 00:47:55.702 [INFO][3404] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-w2bm7" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:47:55.756062 env[1207]: 2025-05-15 00:47:55.702 [INFO][3404] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidad0251099e ContainerID="0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-w2bm7" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:47:55.756062 env[1207]: 2025-05-15 00:47:55.733 [INFO][3404] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-w2bm7" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:47:55.756062 env[1207]: 2025-05-15 00:47:55.735 [INFO][3404] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-w2bm7" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0", GenerateName:"calico-apiserver-789d76996-", Namespace:"calico-apiserver", SelfLink:"", UID:"3b5565d8-a2c6-4be6-a224-b5f9a83d4786", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789d76996", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33", Pod:"calico-apiserver-789d76996-w2bm7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidad0251099e", MAC:"fa:d8:79:f7:8e:2b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:47:55.756062 env[1207]: 2025-05-15 00:47:55.751 [INFO][3404] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-w2bm7" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:47:55.781000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.781000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.781000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.781000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.781000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.781000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.781000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.781000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.781000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.781000 audit: BPF prog-id=139 op=LOAD May 15 00:47:55.781000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdfbfaee00 a2=98 a3=3 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.781000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.782000 audit: BPF prog-id=139 op=UNLOAD May 15 00:47:55.782000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit: BPF prog-id=140 op=LOAD May 15 00:47:55.782000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfbfaebe0 a2=74 a3=540051 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.782000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.782000 audit: BPF prog-id=140 op=UNLOAD May 15 00:47:55.782000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.782000 audit: BPF prog-id=141 op=LOAD May 15 00:47:55.782000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfbfaec10 a2=94 a3=2 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.782000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.782000 audit: BPF prog-id=141 op=UNLOAD May 15 00:47:55.796014 systemd-networkd[1025]: cali1cbe480fdac: Link UP May 15 00:47:55.797313 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1cbe480fdac: link becomes ready May 15 00:47:55.797191 systemd-networkd[1025]: cali1cbe480fdac: Gained carrier May 15 00:47:55.806022 env[1207]: time="2025-05-15T00:47:55.805880436Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:55.806022 env[1207]: time="2025-05-15T00:47:55.805927805Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:55.806022 env[1207]: time="2025-05-15T00:47:55.805954084Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:55.807006 env[1207]: time="2025-05-15T00:47:55.806328939Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33 pid=3610 runtime=io.containerd.runc.v2 May 15 00:47:55.818183 systemd[1]: Started cri-containerd-0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33.scope. May 15 00:47:55.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.835000 audit: BPF prog-id=142 op=LOAD May 15 00:47:55.836000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.836000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3610 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.605 [INFO][3445] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.618 [INFO][3445] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0 calico-apiserver-789d76996- calico-apiserver 05f35d15-5b08-4df6-bd81-0d251d912643 902 0 2025-05-15 00:47:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:789d76996 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-789d76996-zb2pp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1cbe480fdac [] []}} ContainerID="43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-zb2pp" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--zb2pp-" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.618 [INFO][3445] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-zb2pp" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.685 [INFO][3536] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" HandleID="k8s-pod-network.43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.705 [INFO][3536] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" HandleID="k8s-pod-network.43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003e2b00), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-789d76996-zb2pp", "timestamp":"2025-05-15 00:47:55.685842307 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.705 [INFO][3536] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.705 [INFO][3536] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.705 [INFO][3536] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.712 [INFO][3536] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" host="localhost" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.752 [INFO][3536] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.761 [INFO][3536] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.764 [INFO][3536] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.767 [INFO][3536] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.767 [INFO][3536] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" host="localhost" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.768 [INFO][3536] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4 May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.777 [INFO][3536] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" host="localhost" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.792 [INFO][3536] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" host="localhost" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.792 [INFO][3536] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" host="localhost" May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.792 [INFO][3536] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:47:55.837545 env[1207]: 2025-05-15 00:47:55.792 [INFO][3536] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" HandleID="k8s-pod-network.43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:47:55.838307 env[1207]: 2025-05-15 00:47:55.794 [INFO][3445] cni-plugin/k8s.go 386: Populated endpoint ContainerID="43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-zb2pp" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0", GenerateName:"calico-apiserver-789d76996-", Namespace:"calico-apiserver", SelfLink:"", UID:"05f35d15-5b08-4df6-bd81-0d251d912643", ResourceVersion:"902", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789d76996", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-789d76996-zb2pp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1cbe480fdac", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:47:55.838307 env[1207]: 2025-05-15 00:47:55.795 [INFO][3445] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-zb2pp" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:47:55.838307 env[1207]: 2025-05-15 00:47:55.795 [INFO][3445] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1cbe480fdac ContainerID="43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-zb2pp" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:47:55.838307 env[1207]: 2025-05-15 00:47:55.797 [INFO][3445] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-zb2pp" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:47:55.838307 env[1207]: 2025-05-15 00:47:55.797 [INFO][3445] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-zb2pp" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0", GenerateName:"calico-apiserver-789d76996-", Namespace:"calico-apiserver", SelfLink:"", UID:"05f35d15-5b08-4df6-bd81-0d251d912643", ResourceVersion:"902", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789d76996", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4", Pod:"calico-apiserver-789d76996-zb2pp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1cbe480fdac", MAC:"e2:18:33:ed:83:4e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:47:55.838307 env[1207]: 2025-05-15 00:47:55.835 [INFO][3445] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4" Namespace="calico-apiserver" Pod="calico-apiserver-789d76996-zb2pp" WorkloadEndpoint="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:47:55.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037323165323438343739623233383766303434366466306239393839 May 15 00:47:55.837000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.837000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3610 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037323165323438343739623233383766303434366466306239393839 May 15 00:47:55.837000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.837000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.837000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.837000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.837000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.837000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.837000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.837000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.837000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.837000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.837000 audit: BPF prog-id=143 op=LOAD May 15 00:47:55.837000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000293780 items=0 ppid=3610 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037323165323438343739623233383766303434366466306239393839 May 15 00:47:55.838000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.838000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.838000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.838000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.838000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.838000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.838000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.838000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.838000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.838000 audit: BPF prog-id=144 op=LOAD May 15 00:47:55.838000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002937c8 items=0 ppid=3610 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037323165323438343739623233383766303434366466306239393839 May 15 00:47:55.839000 audit: BPF prog-id=144 op=UNLOAD May 15 00:47:55.839000 audit: BPF prog-id=143 op=UNLOAD May 15 00:47:55.839000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.839000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.839000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.839000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.839000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.839000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.839000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.839000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.839000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.839000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.839000 audit: BPF prog-id=145 op=LOAD May 15 00:47:55.839000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000293bd8 items=0 ppid=3610 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037323165323438343739623233383766303434366466306239393839 May 15 00:47:55.842122 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:47:55.865018 env[1207]: time="2025-05-15T00:47:55.864980440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789d76996-w2bm7,Uid:3b5565d8-a2c6-4be6-a224-b5f9a83d4786,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33\"" May 15 00:47:55.868134 env[1207]: time="2025-05-15T00:47:55.868100081Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 00:47:55.868607 env[1207]: time="2025-05-15T00:47:55.868522074Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:55.868667 env[1207]: time="2025-05-15T00:47:55.868622823Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:55.868693 env[1207]: time="2025-05-15T00:47:55.868661054Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:55.871317 env[1207]: time="2025-05-15T00:47:55.871284162Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4 pid=3659 runtime=io.containerd.runc.v2 May 15 00:47:55.881627 systemd[1]: Started cri-containerd-43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4.scope. May 15 00:47:55.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.892000 audit: BPF prog-id=146 op=LOAD May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3659 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626237303632633034643837616166366231393339636537323632 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3659 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626237303632633034643837616166366231393339636537323632 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit: BPF prog-id=147 op=LOAD May 15 00:47:55.893000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003f4650 items=0 ppid=3659 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626237303632633034643837616166366231393339636537323632 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit: BPF prog-id=148 op=LOAD May 15 00:47:55.893000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003f4698 items=0 ppid=3659 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626237303632633034643837616166366231393339636537323632 May 15 00:47:55.893000 audit: BPF prog-id=148 op=UNLOAD May 15 00:47:55.893000 audit: BPF prog-id=147 op=UNLOAD May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.893000 audit: BPF prog-id=149 op=LOAD May 15 00:47:55.893000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f4aa8 items=0 ppid=3659 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626237303632633034643837616166366231393339636537323632 May 15 00:47:55.895191 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:47:55.907000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.907000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.907000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.907000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.907000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.907000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.907000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.907000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.907000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.907000 audit: BPF prog-id=150 op=LOAD May 15 00:47:55.907000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfbfaead0 a2=40 a3=1 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.907000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.908000 audit: BPF prog-id=150 op=UNLOAD May 15 00:47:55.908000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.908000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdfbfaeba0 a2=50 a3=7ffdfbfaec80 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.908000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918794 env[1207]: time="2025-05-15T00:47:55.918731765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-789d76996-zb2pp,Uid:05f35d15-5b08-4df6-bd81-0d251d912643,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4\"" May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfbfaeae0 a2=28 a3=0 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfbfaeb10 a2=28 a3=0 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfbfaea20 a2=28 a3=0 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfbfaeb30 a2=28 a3=0 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfbfaeb10 a2=28 a3=0 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfbfaeb00 a2=28 a3=0 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfbfaeb30 a2=28 a3=0 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfbfaeb10 a2=28 a3=0 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfbfaeb30 a2=28 a3=0 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfbfaeb00 a2=28 a3=0 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfbfaeb70 a2=28 a3=0 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdfbfae920 a2=50 a3=1 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit: BPF prog-id=151 op=LOAD May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdfbfae920 a2=94 a3=5 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit: BPF prog-id=151 op=UNLOAD May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdfbfae9d0 a2=50 a3=1 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdfbfaeaf0 a2=4 a3=38 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.918000 audit[3600]: AVC avc: denied { confidentiality } for pid=3600 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:47:55.918000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfbfaeb40 a2=94 a3=6 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.919000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { confidentiality } for pid=3600 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:47:55.919000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfbfae2f0 a2=94 a3=83 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.919000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.919000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.919000 audit[3600]: AVC avc: denied { confidentiality } for pid=3600 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:47:55.919000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfbfae2f0 a2=94 a3=83 items=0 ppid=3443 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.919000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 00:47:55.926000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.926000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.926000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.926000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.926000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.926000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.926000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.926000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.926000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.926000 audit: BPF prog-id=152 op=LOAD May 15 00:47:55.926000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1a352080 a2=98 a3=1999999999999999 items=0 ppid=3443 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.926000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:47:55.927000 audit: BPF prog-id=152 op=UNLOAD May 15 00:47:55.927000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit: BPF prog-id=153 op=LOAD May 15 00:47:55.927000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1a351f60 a2=74 a3=ffff items=0 ppid=3443 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.927000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:47:55.927000 audit: BPF prog-id=153 op=UNLOAD May 15 00:47:55.927000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.927000 audit: BPF prog-id=154 op=LOAD May 15 00:47:55.927000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1a351fa0 a2=40 a3=7ffd1a352180 items=0 ppid=3443 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.927000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 00:47:55.928000 audit: BPF prog-id=154 op=UNLOAD May 15 00:47:55.970799 systemd-networkd[1025]: vxlan.calico: Link UP May 15 00:47:55.970808 systemd-networkd[1025]: vxlan.calico: Gained carrier May 15 00:47:55.988000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.988000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.988000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.988000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.988000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.988000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.988000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.988000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.988000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.988000 audit: BPF prog-id=155 op=LOAD May 15 00:47:55.988000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe83e64d0 a2=98 a3=ffffffff items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.988000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.988000 audit: BPF prog-id=155 op=UNLOAD May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit: BPF prog-id=156 op=LOAD May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe83e62e0 a2=74 a3=540051 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit: BPF prog-id=156 op=UNLOAD May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit: BPF prog-id=157 op=LOAD May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe83e6310 a2=94 a3=2 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit: BPF prog-id=157 op=UNLOAD May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe83e61e0 a2=28 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe83e6210 a2=28 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe83e6120 a2=28 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe83e6230 a2=28 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe83e6210 a2=28 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe83e6200 a2=28 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe83e6230 a2=28 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe83e6210 a2=28 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe83e6230 a2=28 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe83e6200 a2=28 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe83e6270 a2=28 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.989000 audit: BPF prog-id=158 op=LOAD May 15 00:47:55.989000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe83e60e0 a2=40 a3=0 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.989000 audit: BPF prog-id=158 op=UNLOAD May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffe83e60d0 a2=50 a3=2800 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.990000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffe83e60d0 a2=50 a3=2800 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.990000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit: BPF prog-id=159 op=LOAD May 15 00:47:55.990000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe83e58f0 a2=94 a3=2 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.990000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.990000 audit: BPF prog-id=159 op=UNLOAD May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.990000 audit: BPF prog-id=160 op=LOAD May 15 00:47:55.990000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe83e59f0 a2=94 a3=30 items=0 ppid=3443 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.990000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 00:47:55.996000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.996000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.996000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.996000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.996000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.996000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.996000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.996000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.996000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.996000 audit: BPF prog-id=161 op=LOAD May 15 00:47:55.996000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc73d7b7d0 a2=98 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:55.996000 audit: BPF prog-id=161 op=UNLOAD May 15 00:47:55.997000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit: BPF prog-id=162 op=LOAD May 15 00:47:55.997000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc73d7b5b0 a2=74 a3=540051 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.997000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:55.997000 audit: BPF prog-id=162 op=UNLOAD May 15 00:47:55.997000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:55.997000 audit: BPF prog-id=163 op=LOAD May 15 00:47:55.997000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc73d7b5e0 a2=94 a3=2 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:55.997000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:55.997000 audit: BPF prog-id=163 op=UNLOAD May 15 00:47:56.098000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.098000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.098000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.098000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.098000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.098000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.098000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.098000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.098000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.098000 audit: BPF prog-id=164 op=LOAD May 15 00:47:56.098000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc73d7b4a0 a2=40 a3=1 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.098000 audit: BPF prog-id=164 op=UNLOAD May 15 00:47:56.098000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.098000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc73d7b570 a2=50 a3=7ffc73d7b650 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc73d7b4b0 a2=28 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc73d7b4e0 a2=28 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc73d7b3f0 a2=28 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc73d7b500 a2=28 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc73d7b4e0 a2=28 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc73d7b4d0 a2=28 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc73d7b500 a2=28 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc73d7b4e0 a2=28 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc73d7b500 a2=28 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc73d7b4d0 a2=28 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc73d7b540 a2=28 a3=0 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc73d7b2f0 a2=50 a3=1 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit: BPF prog-id=165 op=LOAD May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc73d7b2f0 a2=94 a3=5 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit: BPF prog-id=165 op=UNLOAD May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc73d7b3a0 a2=50 a3=1 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc73d7b4c0 a2=4 a3=38 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { confidentiality } for pid=3725 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc73d7b510 a2=94 a3=6 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.106000 audit[3725]: AVC avc: denied { confidentiality } for pid=3725 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:47:56.106000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc73d7acc0 a2=94 a3=83 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { confidentiality } for pid=3725 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 00:47:56.107000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc73d7acc0 a2=94 a3=83 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc73d7c700 a2=10 a3=208 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc73d7c5a0 a2=10 a3=3 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc73d7c540 a2=10 a3=3 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.107000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:56.107000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc73d7c540 a2=10 a3=7 items=0 ppid=3443 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 00:47:56.113000 audit: BPF prog-id=160 op=UNLOAD May 15 00:47:56.132735 systemd[1]: run-netns-cni\x2dc0b128a4\x2d7d4a\x2d8b09\x2d1d70\x2df4f661b027c5.mount: Deactivated successfully. May 15 00:47:56.163000 audit[3758]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3758 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:47:56.163000 audit[3758]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe72c85950 a2=0 a3=7ffe72c8593c items=0 ppid=3443 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.163000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:47:56.168000 audit[3757]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3757 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:47:56.168000 audit[3757]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc7d155680 a2=0 a3=7ffc7d15566c items=0 ppid=3443 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.168000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:47:56.172000 audit[3761]: NETFILTER_CFG table=filter:99 family=2 entries=101 op=nft_register_chain pid=3761 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:47:56.172000 audit[3761]: SYSCALL arch=c000003e syscall=46 success=yes exit=58176 a0=3 a1=7ffc6b001930 a2=0 a3=7ffc6b00191c items=0 ppid=3443 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.172000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:47:56.172000 audit[3756]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3756 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:47:56.172000 audit[3756]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffccfb94fc0 a2=0 a3=55f148407000 items=0 ppid=3443 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:56.172000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:47:56.525410 kubelet[2048]: E0515 00:47:56.525383 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:57.141479 systemd-networkd[1025]: cali1cbe480fdac: Gained IPv6LL May 15 00:47:57.391722 env[1207]: time="2025-05-15T00:47:57.391685517Z" level=info msg="StopPodSandbox for \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\"" May 15 00:47:57.392518 env[1207]: time="2025-05-15T00:47:57.391685567Z" level=info msg="StopPodSandbox for \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\"" May 15 00:47:57.392518 env[1207]: time="2025-05-15T00:47:57.391696918Z" level=info msg="StopPodSandbox for \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\"" May 15 00:47:57.463110 systemd-networkd[1025]: calidad0251099e: Gained IPv6LL May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.471 [INFO][3838] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.471 [INFO][3838] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" iface="eth0" netns="/var/run/netns/cni-61d2ae86-6bb8-3ec3-4604-04929b844279" May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.471 [INFO][3838] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" iface="eth0" netns="/var/run/netns/cni-61d2ae86-6bb8-3ec3-4604-04929b844279" May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.471 [INFO][3838] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" iface="eth0" netns="/var/run/netns/cni-61d2ae86-6bb8-3ec3-4604-04929b844279" May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.471 [INFO][3838] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.471 [INFO][3838] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.497 [INFO][3862] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" HandleID="k8s-pod-network.c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.497 [INFO][3862] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.497 [INFO][3862] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.509 [WARNING][3862] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" HandleID="k8s-pod-network.c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.509 [INFO][3862] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" HandleID="k8s-pod-network.c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.510 [INFO][3862] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:47:57.514459 env[1207]: 2025-05-15 00:47:57.512 [INFO][3838] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:47:57.516952 systemd[1]: run-netns-cni\x2d61d2ae86\x2d6bb8\x2d3ec3\x2d4604\x2d04929b844279.mount: Deactivated successfully. May 15 00:47:57.518371 env[1207]: time="2025-05-15T00:47:57.518308524Z" level=info msg="TearDown network for sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\" successfully" May 15 00:47:57.518472 env[1207]: time="2025-05-15T00:47:57.518442446Z" level=info msg="StopPodSandbox for \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\" returns successfully" May 15 00:47:57.518881 kubelet[2048]: E0515 00:47:57.518850 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:57.519715 env[1207]: time="2025-05-15T00:47:57.519698105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-ddhvw,Uid:378dde4c-1f84-4b06-8c25-00678d54c37b,Namespace:kube-system,Attempt:1,}" May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.474 [INFO][3839] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.474 [INFO][3839] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" iface="eth0" netns="/var/run/netns/cni-2d6e4e1d-33eb-7dbd-8ffb-51385df748b8" May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.474 [INFO][3839] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" iface="eth0" netns="/var/run/netns/cni-2d6e4e1d-33eb-7dbd-8ffb-51385df748b8" May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.475 [INFO][3839] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" iface="eth0" netns="/var/run/netns/cni-2d6e4e1d-33eb-7dbd-8ffb-51385df748b8" May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.475 [INFO][3839] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.475 [INFO][3839] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.499 [INFO][3868] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" HandleID="k8s-pod-network.8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.499 [INFO][3868] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.510 [INFO][3868] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.518 [WARNING][3868] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" HandleID="k8s-pod-network.8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.518 [INFO][3868] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" HandleID="k8s-pod-network.8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.520 [INFO][3868] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:47:57.523943 env[1207]: 2025-05-15 00:47:57.522 [INFO][3839] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:47:57.526640 env[1207]: time="2025-05-15T00:47:57.526609056Z" level=info msg="TearDown network for sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\" successfully" May 15 00:47:57.526719 env[1207]: time="2025-05-15T00:47:57.526698253Z" level=info msg="StopPodSandbox for \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\" returns successfully" May 15 00:47:57.526878 systemd[1]: run-netns-cni\x2d2d6e4e1d\x2d33eb\x2d7dbd\x2d8ffb\x2d51385df748b8.mount: Deactivated successfully. May 15 00:47:57.527980 env[1207]: time="2025-05-15T00:47:57.527947740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gjf4x,Uid:e18a49a0-35d4-453b-952b-0a4f021f03ad,Namespace:calico-system,Attempt:1,}" May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.506 [INFO][3840] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.506 [INFO][3840] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" iface="eth0" netns="/var/run/netns/cni-9e37fbd7-0455-9571-a8f4-e1fbf88f2cd5" May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.506 [INFO][3840] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" iface="eth0" netns="/var/run/netns/cni-9e37fbd7-0455-9571-a8f4-e1fbf88f2cd5" May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.506 [INFO][3840] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" iface="eth0" netns="/var/run/netns/cni-9e37fbd7-0455-9571-a8f4-e1fbf88f2cd5" May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.506 [INFO][3840] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.506 [INFO][3840] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.549 [INFO][3880] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" HandleID="k8s-pod-network.e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.549 [INFO][3880] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.549 [INFO][3880] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.556 [WARNING][3880] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" HandleID="k8s-pod-network.e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.556 [INFO][3880] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" HandleID="k8s-pod-network.e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.557 [INFO][3880] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:47:57.562829 env[1207]: 2025-05-15 00:47:57.561 [INFO][3840] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:47:57.563306 env[1207]: time="2025-05-15T00:47:57.562939575Z" level=info msg="TearDown network for sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\" successfully" May 15 00:47:57.563306 env[1207]: time="2025-05-15T00:47:57.562975923Z" level=info msg="StopPodSandbox for \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\" returns successfully" May 15 00:47:57.563711 env[1207]: time="2025-05-15T00:47:57.563671811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7df9b79fbf-pdk5w,Uid:5781e7f0-4915-430d-8593-cc1b96c9c3c4,Namespace:calico-system,Attempt:1,}" May 15 00:47:57.764605 systemd-networkd[1025]: calibc14d2cf48e: Link UP May 15 00:47:57.767589 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:47:57.767664 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibc14d2cf48e: link becomes ready May 15 00:47:57.767642 systemd-networkd[1025]: calibc14d2cf48e: Gained carrier May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.591 [INFO][3886] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0 coredns-7db6d8ff4d- kube-system 378dde4c-1f84-4b06-8c25-00678d54c37b 923 0 2025-05-15 00:47:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-ddhvw eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibc14d2cf48e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" Namespace="kube-system" Pod="coredns-7db6d8ff4d-ddhvw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--ddhvw-" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.592 [INFO][3886] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" Namespace="kube-system" Pod="coredns-7db6d8ff4d-ddhvw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.635 [INFO][3934] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" HandleID="k8s-pod-network.0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.644 [INFO][3934] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" HandleID="k8s-pod-network.0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002df300), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-ddhvw", "timestamp":"2025-05-15 00:47:57.635818786 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.645 [INFO][3934] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.645 [INFO][3934] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.645 [INFO][3934] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.646 [INFO][3934] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" host="localhost" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.649 [INFO][3934] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.655 [INFO][3934] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.657 [INFO][3934] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.659 [INFO][3934] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.659 [INFO][3934] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" host="localhost" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.660 [INFO][3934] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417 May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.693 [INFO][3934] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" host="localhost" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.757 [INFO][3934] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" host="localhost" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.757 [INFO][3934] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" host="localhost" May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.757 [INFO][3934] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:47:57.798355 env[1207]: 2025-05-15 00:47:57.757 [INFO][3934] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" HandleID="k8s-pod-network.0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:47:57.798999 env[1207]: 2025-05-15 00:47:57.760 [INFO][3886] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" Namespace="kube-system" Pod="coredns-7db6d8ff4d-ddhvw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"378dde4c-1f84-4b06-8c25-00678d54c37b", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-ddhvw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc14d2cf48e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:47:57.798999 env[1207]: 2025-05-15 00:47:57.760 [INFO][3886] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" Namespace="kube-system" Pod="coredns-7db6d8ff4d-ddhvw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:47:57.798999 env[1207]: 2025-05-15 00:47:57.760 [INFO][3886] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibc14d2cf48e ContainerID="0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" Namespace="kube-system" Pod="coredns-7db6d8ff4d-ddhvw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:47:57.798999 env[1207]: 2025-05-15 00:47:57.767 [INFO][3886] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" Namespace="kube-system" Pod="coredns-7db6d8ff4d-ddhvw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:47:57.798999 env[1207]: 2025-05-15 00:47:57.768 [INFO][3886] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" Namespace="kube-system" Pod="coredns-7db6d8ff4d-ddhvw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"378dde4c-1f84-4b06-8c25-00678d54c37b", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417", Pod:"coredns-7db6d8ff4d-ddhvw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc14d2cf48e", MAC:"b2:85:ef:cb:89:a0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:47:57.798999 env[1207]: 2025-05-15 00:47:57.796 [INFO][3886] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417" Namespace="kube-system" Pod="coredns-7db6d8ff4d-ddhvw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:47:57.804000 audit[3970]: NETFILTER_CFG table=filter:101 family=2 entries=42 op=nft_register_chain pid=3970 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:47:57.804000 audit[3970]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7fff304e3d10 a2=0 a3=7fff304e3cfc items=0 ppid=3443 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:57.804000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:47:57.845606 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL May 15 00:47:57.870040 env[1207]: time="2025-05-15T00:47:57.869967719Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:57.870040 env[1207]: time="2025-05-15T00:47:57.870007905Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:57.870040 env[1207]: time="2025-05-15T00:47:57.870017813Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:57.870283 env[1207]: time="2025-05-15T00:47:57.870219934Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417 pid=3983 runtime=io.containerd.runc.v2 May 15 00:47:57.885731 systemd[1]: Started cri-containerd-0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417.scope. May 15 00:47:57.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.898000 audit: BPF prog-id=166 op=LOAD May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3983 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:57.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064363762333833303735623263613662653737383666373166646133 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3983 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:57.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064363762333833303735623263613662653737383666373166646133 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit: BPF prog-id=167 op=LOAD May 15 00:47:57.899000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000213930 items=0 ppid=3983 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:57.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064363762333833303735623263613662653737383666373166646133 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit: BPF prog-id=168 op=LOAD May 15 00:47:57.899000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000213978 items=0 ppid=3983 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:57.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064363762333833303735623263613662653737383666373166646133 May 15 00:47:57.899000 audit: BPF prog-id=168 op=UNLOAD May 15 00:47:57.899000 audit: BPF prog-id=167 op=UNLOAD May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:57.899000 audit: BPF prog-id=169 op=LOAD May 15 00:47:57.899000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000213d88 items=0 ppid=3983 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:57.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064363762333833303735623263613662653737383666373166646133 May 15 00:47:57.901585 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:47:57.924933 env[1207]: time="2025-05-15T00:47:57.922859607Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-ddhvw,Uid:378dde4c-1f84-4b06-8c25-00678d54c37b,Namespace:kube-system,Attempt:1,} returns sandbox id \"0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417\"" May 15 00:47:57.925112 kubelet[2048]: E0515 00:47:57.923543 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:57.926780 env[1207]: time="2025-05-15T00:47:57.926709839Z" level=info msg="CreateContainer within sandbox \"0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 00:47:57.947928 systemd-networkd[1025]: cali25ac648ff3b: Link UP May 15 00:47:57.949450 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali25ac648ff3b: link becomes ready May 15 00:47:57.949349 systemd-networkd[1025]: cali25ac648ff3b: Gained carrier May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.627 [INFO][3919] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0 calico-kube-controllers-7df9b79fbf- calico-system 5781e7f0-4915-430d-8593-cc1b96c9c3c4 925 0 2025-05-15 00:47:30 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7df9b79fbf projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7df9b79fbf-pdk5w eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali25ac648ff3b [] []}} ContainerID="c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" Namespace="calico-system" Pod="calico-kube-controllers-7df9b79fbf-pdk5w" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.627 [INFO][3919] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" Namespace="calico-system" Pod="calico-kube-controllers-7df9b79fbf-pdk5w" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.675 [INFO][3944] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" HandleID="k8s-pod-network.c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.698 [INFO][3944] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" HandleID="k8s-pod-network.c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000484ee0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7df9b79fbf-pdk5w", "timestamp":"2025-05-15 00:47:57.675794532 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.698 [INFO][3944] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.757 [INFO][3944] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.757 [INFO][3944] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.775 [INFO][3944] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" host="localhost" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.797 [INFO][3944] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.803 [INFO][3944] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.805 [INFO][3944] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.807 [INFO][3944] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.807 [INFO][3944] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" host="localhost" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.809 [INFO][3944] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86 May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.821 [INFO][3944] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" host="localhost" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.944 [INFO][3944] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" host="localhost" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.944 [INFO][3944] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" host="localhost" May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.944 [INFO][3944] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:47:58.011656 env[1207]: 2025-05-15 00:47:57.944 [INFO][3944] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" HandleID="k8s-pod-network.c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:47:58.012358 env[1207]: 2025-05-15 00:47:57.945 [INFO][3919] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" Namespace="calico-system" Pod="calico-kube-controllers-7df9b79fbf-pdk5w" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0", GenerateName:"calico-kube-controllers-7df9b79fbf-", Namespace:"calico-system", SelfLink:"", UID:"5781e7f0-4915-430d-8593-cc1b96c9c3c4", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7df9b79fbf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7df9b79fbf-pdk5w", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali25ac648ff3b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:47:58.012358 env[1207]: 2025-05-15 00:47:57.946 [INFO][3919] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" Namespace="calico-system" Pod="calico-kube-controllers-7df9b79fbf-pdk5w" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:47:58.012358 env[1207]: 2025-05-15 00:47:57.946 [INFO][3919] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali25ac648ff3b ContainerID="c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" Namespace="calico-system" Pod="calico-kube-controllers-7df9b79fbf-pdk5w" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:47:58.012358 env[1207]: 2025-05-15 00:47:57.949 [INFO][3919] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" Namespace="calico-system" Pod="calico-kube-controllers-7df9b79fbf-pdk5w" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:47:58.012358 env[1207]: 2025-05-15 00:47:57.950 [INFO][3919] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" Namespace="calico-system" Pod="calico-kube-controllers-7df9b79fbf-pdk5w" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0", GenerateName:"calico-kube-controllers-7df9b79fbf-", Namespace:"calico-system", SelfLink:"", UID:"5781e7f0-4915-430d-8593-cc1b96c9c3c4", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7df9b79fbf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86", Pod:"calico-kube-controllers-7df9b79fbf-pdk5w", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali25ac648ff3b", MAC:"4e:62:13:40:84:8e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:47:58.012358 env[1207]: 2025-05-15 00:47:58.007 [INFO][3919] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86" Namespace="calico-system" Pod="calico-kube-controllers-7df9b79fbf-pdk5w" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:47:58.017000 audit[4030]: NETFILTER_CFG table=filter:102 family=2 entries=46 op=nft_register_chain pid=4030 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:47:58.017000 audit[4030]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffc299b77c0 a2=0 a3=7ffc299b77ac items=0 ppid=3443 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.017000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:47:58.111267 systemd-networkd[1025]: cali2c16ff710e5: Link UP May 15 00:47:58.113135 systemd-networkd[1025]: cali2c16ff710e5: Gained carrier May 15 00:47:58.113505 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2c16ff710e5: link becomes ready May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:57.632 [INFO][3898] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--gjf4x-eth0 csi-node-driver- calico-system e18a49a0-35d4-453b-952b-0a4f021f03ad 924 0 2025-05-15 00:47:30 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-gjf4x eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali2c16ff710e5 [] []}} ContainerID="370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" Namespace="calico-system" Pod="csi-node-driver-gjf4x" WorkloadEndpoint="localhost-k8s-csi--node--driver--gjf4x-" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:57.632 [INFO][3898] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" Namespace="calico-system" Pod="csi-node-driver-gjf4x" WorkloadEndpoint="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:57.675 [INFO][3949] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" HandleID="k8s-pod-network.370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:57.698 [INFO][3949] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" HandleID="k8s-pod-network.370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002867f0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-gjf4x", "timestamp":"2025-05-15 00:47:57.675386696 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:57.698 [INFO][3949] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:57.944 [INFO][3949] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:57.944 [INFO][3949] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:57.951 [INFO][3949] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" host="localhost" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:58.003 [INFO][3949] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:58.010 [INFO][3949] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:58.012 [INFO][3949] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:58.014 [INFO][3949] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:58.014 [INFO][3949] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" host="localhost" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:58.015 [INFO][3949] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2 May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:58.028 [INFO][3949] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" host="localhost" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:58.106 [INFO][3949] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" host="localhost" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:58.106 [INFO][3949] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" host="localhost" May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:58.106 [INFO][3949] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:47:58.174757 env[1207]: 2025-05-15 00:47:58.106 [INFO][3949] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" HandleID="k8s-pod-network.370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:47:58.175376 env[1207]: 2025-05-15 00:47:58.109 [INFO][3898] cni-plugin/k8s.go 386: Populated endpoint ContainerID="370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" Namespace="calico-system" Pod="csi-node-driver-gjf4x" WorkloadEndpoint="localhost-k8s-csi--node--driver--gjf4x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--gjf4x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e18a49a0-35d4-453b-952b-0a4f021f03ad", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-gjf4x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2c16ff710e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:47:58.175376 env[1207]: 2025-05-15 00:47:58.109 [INFO][3898] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" Namespace="calico-system" Pod="csi-node-driver-gjf4x" WorkloadEndpoint="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:47:58.175376 env[1207]: 2025-05-15 00:47:58.109 [INFO][3898] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2c16ff710e5 ContainerID="370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" Namespace="calico-system" Pod="csi-node-driver-gjf4x" WorkloadEndpoint="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:47:58.175376 env[1207]: 2025-05-15 00:47:58.113 [INFO][3898] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" Namespace="calico-system" Pod="csi-node-driver-gjf4x" WorkloadEndpoint="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:47:58.175376 env[1207]: 2025-05-15 00:47:58.113 [INFO][3898] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" Namespace="calico-system" Pod="csi-node-driver-gjf4x" WorkloadEndpoint="localhost-k8s-csi--node--driver--gjf4x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--gjf4x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e18a49a0-35d4-453b-952b-0a4f021f03ad", ResourceVersion:"924", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2", Pod:"csi-node-driver-gjf4x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2c16ff710e5", MAC:"9a:3d:e8:cf:73:46", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:47:58.175376 env[1207]: 2025-05-15 00:47:58.173 [INFO][3898] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2" Namespace="calico-system" Pod="csi-node-driver-gjf4x" WorkloadEndpoint="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:47:58.181000 audit[4039]: NETFILTER_CFG table=filter:103 family=2 entries=52 op=nft_register_chain pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:47:58.181000 audit[4039]: SYSCALL arch=c000003e syscall=46 success=yes exit=25056 a0=3 a1=7ffe1cb9a780 a2=0 a3=7ffe1cb9a76c items=0 ppid=3443 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.181000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:47:58.200902 env[1207]: time="2025-05-15T00:47:58.200361799Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:58.200902 env[1207]: time="2025-05-15T00:47:58.200420159Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:58.200902 env[1207]: time="2025-05-15T00:47:58.200435988Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:58.200902 env[1207]: time="2025-05-15T00:47:58.200659117Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86 pid=4058 runtime=io.containerd.runc.v2 May 15 00:47:58.201766 env[1207]: time="2025-05-15T00:47:58.201045894Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:47:58.201766 env[1207]: time="2025-05-15T00:47:58.201087983Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:47:58.201766 env[1207]: time="2025-05-15T00:47:58.201101608Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:47:58.201766 env[1207]: time="2025-05-15T00:47:58.201299610Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2 pid=4068 runtime=io.containerd.runc.v2 May 15 00:47:58.213537 env[1207]: time="2025-05-15T00:47:58.213485087Z" level=info msg="CreateContainer within sandbox \"0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7c52cbabd78a20d7a08c4762196afcf0dab8b84470aa4cf30d2b416686d0eac4\"" May 15 00:47:58.214554 env[1207]: time="2025-05-15T00:47:58.214529939Z" level=info msg="StartContainer for \"7c52cbabd78a20d7a08c4762196afcf0dab8b84470aa4cf30d2b416686d0eac4\"" May 15 00:47:58.218171 systemd[1]: Started cri-containerd-c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86.scope. May 15 00:47:58.225992 systemd[1]: Started cri-containerd-370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2.scope. May 15 00:47:58.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.234000 audit: BPF prog-id=170 op=LOAD May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4068 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337306365616665616231316133383666613334333135343764373965 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4068 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337306365616665616231316133383666613334333135343764373965 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit: BPF prog-id=171 op=LOAD May 15 00:47:58.235000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015d300 items=0 ppid=4068 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337306365616665616231316133383666613334333135343764373965 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit: BPF prog-id=172 op=LOAD May 15 00:47:58.235000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015d348 items=0 ppid=4068 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337306365616665616231316133383666613334333135343764373965 May 15 00:47:58.235000 audit: BPF prog-id=172 op=UNLOAD May 15 00:47:58.235000 audit: BPF prog-id=171 op=UNLOAD May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { perfmon } for pid=4088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit[4088]: AVC avc: denied { bpf } for pid=4088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.235000 audit: BPF prog-id=173 op=LOAD May 15 00:47:58.235000 audit[4088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015d758 items=0 ppid=4068 pid=4088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337306365616665616231316133383666613334333135343764373965 May 15 00:47:58.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.238000 audit: BPF prog-id=174 op=LOAD May 15 00:47:58.239005 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:47:58.239000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.239000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4058 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333623839653631333062363563376266643334346138313436623336 May 15 00:47:58.239000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.239000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4058 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333623839653631333062363563376266643334346138313436623336 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit: BPF prog-id=175 op=LOAD May 15 00:47:58.240000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002603f0 items=0 ppid=4058 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333623839653631333062363563376266643334346138313436623336 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.240000 audit: BPF prog-id=176 op=LOAD May 15 00:47:58.240000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000260438 items=0 ppid=4058 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333623839653631333062363563376266643334346138313436623336 May 15 00:47:58.241000 audit: BPF prog-id=176 op=UNLOAD May 15 00:47:58.241000 audit: BPF prog-id=175 op=UNLOAD May 15 00:47:58.241000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.241000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.241000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.241000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.241000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.241000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.241000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.241000 audit[4080]: AVC avc: denied { perfmon } for pid=4080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.241000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.241000 audit[4080]: AVC avc: denied { bpf } for pid=4080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.241000 audit: BPF prog-id=177 op=LOAD May 15 00:47:58.241000 audit[4080]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000260848 items=0 ppid=4058 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333623839653631333062363563376266643334346138313436623336 May 15 00:47:58.245758 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:47:58.257057 systemd[1]: Started cri-containerd-7c52cbabd78a20d7a08c4762196afcf0dab8b84470aa4cf30d2b416686d0eac4.scope. May 15 00:47:58.260425 env[1207]: time="2025-05-15T00:47:58.260375647Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gjf4x,Uid:e18a49a0-35d4-453b-952b-0a4f021f03ad,Namespace:calico-system,Attempt:1,} returns sandbox id \"370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2\"" May 15 00:47:58.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.268000 audit: BPF prog-id=178 op=LOAD May 15 00:47:58.268000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.268000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3983 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763353263626162643738613230643761303863343736323139366166 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3983 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763353263626162643738613230643761303863343736323139366166 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit: BPF prog-id=179 op=LOAD May 15 00:47:58.269000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000197290 items=0 ppid=3983 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763353263626162643738613230643761303863343736323139366166 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.269000 audit: BPF prog-id=180 op=LOAD May 15 00:47:58.269000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001972d8 items=0 ppid=3983 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763353263626162643738613230643761303863343736323139366166 May 15 00:47:58.270000 audit: BPF prog-id=180 op=UNLOAD May 15 00:47:58.270000 audit: BPF prog-id=179 op=UNLOAD May 15 00:47:58.270000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.270000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.270000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.270000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.270000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.270000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.270000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.270000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.270000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.270000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.270000 audit: BPF prog-id=181 op=LOAD May 15 00:47:58.270000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001976e8 items=0 ppid=3983 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763353263626162643738613230643761303863343736323139366166 May 15 00:47:58.276531 env[1207]: time="2025-05-15T00:47:58.276472289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7df9b79fbf-pdk5w,Uid:5781e7f0-4915-430d-8593-cc1b96c9c3c4,Namespace:calico-system,Attempt:1,} returns sandbox id \"c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86\"" May 15 00:47:58.290685 env[1207]: time="2025-05-15T00:47:58.290639918Z" level=info msg="StartContainer for \"7c52cbabd78a20d7a08c4762196afcf0dab8b84470aa4cf30d2b416686d0eac4\" returns successfully" May 15 00:47:58.513491 env[1207]: time="2025-05-15T00:47:58.513430412Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:58.521353 env[1207]: time="2025-05-15T00:47:58.515362311Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:58.521353 env[1207]: time="2025-05-15T00:47:58.517017499Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:58.521353 env[1207]: time="2025-05-15T00:47:58.518647731Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:58.521353 env[1207]: time="2025-05-15T00:47:58.518835514Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 00:47:58.521353 env[1207]: time="2025-05-15T00:47:58.520806335Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 00:47:58.520318 systemd[1]: run-netns-cni\x2d9e37fbd7\x2d0455\x2d9571\x2da8f4\x2de1fbf88f2cd5.mount: Deactivated successfully. May 15 00:47:58.523789 env[1207]: time="2025-05-15T00:47:58.523745846Z" level=info msg="CreateContainer within sandbox \"0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 00:47:58.531673 kubelet[2048]: E0515 00:47:58.531362 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:58.539065 env[1207]: time="2025-05-15T00:47:58.539020825Z" level=info msg="CreateContainer within sandbox \"0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2b5d2849146d47f04a2ec0a4834c4cddd30b2e476f15a922c1f32daeb3ac93a0\"" May 15 00:47:58.539417 env[1207]: time="2025-05-15T00:47:58.539391913Z" level=info msg="StartContainer for \"2b5d2849146d47f04a2ec0a4834c4cddd30b2e476f15a922c1f32daeb3ac93a0\"" May 15 00:47:58.543002 kubelet[2048]: I0515 00:47:58.542712 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-ddhvw" podStartSLOduration=36.542693524 podStartE2EDuration="36.542693524s" podCreationTimestamp="2025-05-15 00:47:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:47:58.542296909 +0000 UTC m=+50.246640526" watchObservedRunningTime="2025-05-15 00:47:58.542693524 +0000 UTC m=+50.247037151" May 15 00:47:58.565321 systemd[1]: run-containerd-runc-k8s.io-2b5d2849146d47f04a2ec0a4834c4cddd30b2e476f15a922c1f32daeb3ac93a0-runc.Bz6823.mount: Deactivated successfully. May 15 00:47:58.566737 systemd[1]: Started cri-containerd-2b5d2849146d47f04a2ec0a4834c4cddd30b2e476f15a922c1f32daeb3ac93a0.scope. May 15 00:47:58.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.580000 audit: BPF prog-id=182 op=LOAD May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3610 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356432383439313436643437663034613265633061343833346334 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3610 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356432383439313436643437663034613265633061343833346334 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit: BPF prog-id=183 op=LOAD May 15 00:47:58.581000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021a9d0 items=0 ppid=3610 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356432383439313436643437663034613265633061343833346334 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit: BPF prog-id=184 op=LOAD May 15 00:47:58.581000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021aa18 items=0 ppid=3610 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356432383439313436643437663034613265633061343833346334 May 15 00:47:58.581000 audit: BPF prog-id=184 op=UNLOAD May 15 00:47:58.581000 audit: BPF prog-id=183 op=UNLOAD May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:58.581000 audit: BPF prog-id=185 op=LOAD May 15 00:47:58.581000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021ae28 items=0 ppid=3610 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356432383439313436643437663034613265633061343833346334 May 15 00:47:58.686152 env[1207]: time="2025-05-15T00:47:58.686086753Z" level=info msg="StartContainer for \"2b5d2849146d47f04a2ec0a4834c4cddd30b2e476f15a922c1f32daeb3ac93a0\" returns successfully" May 15 00:47:58.715000 audit[4204]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=4204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:58.715000 audit[4204]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff29750b30 a2=0 a3=7fff29750b1c items=0 ppid=2247 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.715000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:58.723000 audit[4204]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=4204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:58.723000 audit[4204]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff29750b30 a2=0 a3=0 items=0 ppid=2247 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.723000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:58.742000 audit[4206]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=4206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:58.742000 audit[4206]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd03b17600 a2=0 a3=7ffd03b175ec items=0 ppid=2247 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:58.746000 audit[4206]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=4206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:58.746000 audit[4206]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd03b17600 a2=0 a3=7ffd03b175ec items=0 ppid=2247 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:58.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:58.933386 systemd-networkd[1025]: calibc14d2cf48e: Gained IPv6LL May 15 00:47:58.986032 env[1207]: time="2025-05-15T00:47:58.985950035Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:58.989028 env[1207]: time="2025-05-15T00:47:58.989003159Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:58.991154 env[1207]: time="2025-05-15T00:47:58.991112622Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:59.000114 env[1207]: time="2025-05-15T00:47:59.000092487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:47:59.000585 env[1207]: time="2025-05-15T00:47:59.000553042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 00:47:59.001589 env[1207]: time="2025-05-15T00:47:59.001439668Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 00:47:59.002283 env[1207]: time="2025-05-15T00:47:59.002223680Z" level=info msg="CreateContainer within sandbox \"43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 00:47:59.083406 env[1207]: time="2025-05-15T00:47:59.083333481Z" level=info msg="CreateContainer within sandbox \"43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0897a81da43bb96dc6a968a9cf8c7e2acc5e40bdaa02edba5274751fa128410d\"" May 15 00:47:59.084148 env[1207]: time="2025-05-15T00:47:59.084115139Z" level=info msg="StartContainer for \"0897a81da43bb96dc6a968a9cf8c7e2acc5e40bdaa02edba5274751fa128410d\"" May 15 00:47:59.100892 systemd[1]: Started cri-containerd-0897a81da43bb96dc6a968a9cf8c7e2acc5e40bdaa02edba5274751fa128410d.scope. May 15 00:47:59.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit: BPF prog-id=186 op=LOAD May 15 00:47:59.113000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3659 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:59.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393761383164613433626239366463366139363861396366386337 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3659 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:59.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393761383164613433626239366463366139363861396366386337 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit: BPF prog-id=187 op=LOAD May 15 00:47:59.113000 audit[4215]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000345df0 items=0 ppid=3659 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:59.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393761383164613433626239366463366139363861396366386337 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.113000 audit: BPF prog-id=188 op=LOAD May 15 00:47:59.113000 audit[4215]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000345e38 items=0 ppid=3659 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:59.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393761383164613433626239366463366139363861396366386337 May 15 00:47:59.114000 audit: BPF prog-id=188 op=UNLOAD May 15 00:47:59.114000 audit: BPF prog-id=187 op=UNLOAD May 15 00:47:59.114000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.114000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.114000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.114000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.114000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.114000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.114000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.114000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.114000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.114000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:47:59.114000 audit: BPF prog-id=189 op=LOAD May 15 00:47:59.114000 audit[4215]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a2248 items=0 ppid=3659 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:59.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393761383164613433626239366463366139363861396366386337 May 15 00:47:59.141821 env[1207]: time="2025-05-15T00:47:59.141768556Z" level=info msg="StartContainer for \"0897a81da43bb96dc6a968a9cf8c7e2acc5e40bdaa02edba5274751fa128410d\" returns successfully" May 15 00:47:59.381443 systemd-networkd[1025]: cali25ac648ff3b: Gained IPv6LL May 15 00:47:59.430000 audit[4182]: AVC avc: denied { watch } for pid=4182 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_00_47_43.2360915381/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c695,c772 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c695,c772 tclass=file permissive=0 May 15 00:47:59.430000 audit[4182]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00048d200 a2=fc6 a3=0 items=0 ppid=3610 pid=4182 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c695,c772 key=(null) May 15 00:47:59.430000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 00:47:59.541105 kubelet[2048]: E0515 00:47:59.541070 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:47:59.549277 kubelet[2048]: I0515 00:47:59.549188 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-789d76996-w2bm7" podStartSLOduration=26.896923118 podStartE2EDuration="29.549170972s" podCreationTimestamp="2025-05-15 00:47:30 +0000 UTC" firstStartedPulling="2025-05-15 00:47:55.8676577 +0000 UTC m=+47.572001327" lastFinishedPulling="2025-05-15 00:47:58.519905554 +0000 UTC m=+50.224249181" observedRunningTime="2025-05-15 00:47:59.549052469 +0000 UTC m=+51.253396096" watchObservedRunningTime="2025-05-15 00:47:59.549170972 +0000 UTC m=+51.253514589" May 15 00:47:59.762000 audit[4226]: AVC avc: denied { watch } for pid=4226 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_00_47_43.235946657/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c912 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c177,c912 tclass=file permissive=0 May 15 00:47:59.762000 audit[4226]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001321c80 a2=fc6 a3=0 items=0 ppid=3659 pid=4226 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c912 key=(null) May 15 00:47:59.762000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 00:47:59.778000 audit[4248]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4248 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:59.778000 audit[4248]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd85c77110 a2=0 a3=7ffd85c770fc items=0 ppid=2247 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:59.778000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:47:59.780920 kubelet[2048]: I0515 00:47:59.780871 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-789d76996-zb2pp" podStartSLOduration=26.700718583 podStartE2EDuration="29.780851728s" podCreationTimestamp="2025-05-15 00:47:30 +0000 UTC" firstStartedPulling="2025-05-15 00:47:55.921079816 +0000 UTC m=+47.625423443" lastFinishedPulling="2025-05-15 00:47:59.001212961 +0000 UTC m=+50.705556588" observedRunningTime="2025-05-15 00:47:59.558379096 +0000 UTC m=+51.262722723" watchObservedRunningTime="2025-05-15 00:47:59.780851728 +0000 UTC m=+51.485195355" May 15 00:47:59.785000 audit[4248]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=4248 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:47:59.785000 audit[4248]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd85c77110 a2=0 a3=7ffd85c770fc items=0 ppid=2247 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:47:59.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:00.085391 systemd-networkd[1025]: cali2c16ff710e5: Gained IPv6LL May 15 00:48:00.392127 env[1207]: time="2025-05-15T00:48:00.392024510Z" level=info msg="StopPodSandbox for \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\"" May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.449 [INFO][4265] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.450 [INFO][4265] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" iface="eth0" netns="/var/run/netns/cni-fe7e80aa-aa1c-b7b9-6302-1b7aacc1d133" May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.450 [INFO][4265] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" iface="eth0" netns="/var/run/netns/cni-fe7e80aa-aa1c-b7b9-6302-1b7aacc1d133" May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.450 [INFO][4265] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" iface="eth0" netns="/var/run/netns/cni-fe7e80aa-aa1c-b7b9-6302-1b7aacc1d133" May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.450 [INFO][4265] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.450 [INFO][4265] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.468 [INFO][4275] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" HandleID="k8s-pod-network.84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.468 [INFO][4275] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.468 [INFO][4275] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.473 [WARNING][4275] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" HandleID="k8s-pod-network.84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.473 [INFO][4275] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" HandleID="k8s-pod-network.84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.474 [INFO][4275] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:00.477564 env[1207]: 2025-05-15 00:48:00.476 [INFO][4265] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:00.479909 systemd[1]: run-netns-cni\x2dfe7e80aa\x2daa1c\x2db7b9\x2d6302\x2d1b7aacc1d133.mount: Deactivated successfully. May 15 00:48:00.480605 env[1207]: time="2025-05-15T00:48:00.480539560Z" level=info msg="TearDown network for sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\" successfully" May 15 00:48:00.480605 env[1207]: time="2025-05-15T00:48:00.480587370Z" level=info msg="StopPodSandbox for \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\" returns successfully" May 15 00:48:00.480934 kubelet[2048]: E0515 00:48:00.480910 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:48:00.481302 env[1207]: time="2025-05-15T00:48:00.481276864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5xvdh,Uid:19401807-1069-4dc0-9325-63f461c2adfa,Namespace:kube-system,Attempt:1,}" May 15 00:48:00.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.19:22-10.0.0.1:49678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:00.532768 systemd[1]: Started sshd@14-10.0.0.19:22-10.0.0.1:49678.service. May 15 00:48:00.533864 kernel: kauditd_printk_skb: 1005 callbacks suppressed May 15 00:48:00.533917 kernel: audit: type=1130 audit(1747270080.531:1313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.19:22-10.0.0.1:49678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:00.542994 kubelet[2048]: E0515 00:48:00.542970 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:48:00.543255 kubelet[2048]: I0515 00:48:00.543225 2048 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 00:48:00.567000 audit[4284]: USER_ACCT pid=4284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.568568 sshd[4284]: Accepted publickey for core from 10.0.0.1 port 49678 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:00.571924 sshd[4284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:00.569000 audit[4284]: CRED_ACQ pid=4284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.577142 kernel: audit: type=1101 audit(1747270080.567:1314): pid=4284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.577194 kernel: audit: type=1103 audit(1747270080.569:1315): pid=4284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.577222 kernel: audit: type=1006 audit(1747270080.569:1316): pid=4284 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 00:48:00.575607 systemd-logind[1191]: New session 15 of user core. May 15 00:48:00.576287 systemd[1]: Started session-15.scope. May 15 00:48:00.569000 audit[4284]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe91c0cbb0 a2=3 a3=0 items=0 ppid=1 pid=4284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.583810 kernel: audit: type=1300 audit(1747270080.569:1316): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe91c0cbb0 a2=3 a3=0 items=0 ppid=1 pid=4284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.583911 kernel: audit: type=1327 audit(1747270080.569:1316): proctitle=737368643A20636F7265205B707269765D May 15 00:48:00.569000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:00.581000 audit[4284]: USER_START pid=4284 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.589818 kernel: audit: type=1105 audit(1747270080.581:1317): pid=4284 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.589930 kernel: audit: type=1103 audit(1747270080.582:1318): pid=4286 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.582000 audit[4286]: CRED_ACQ pid=4286 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.751697 sshd[4284]: pam_unix(sshd:session): session closed for user core May 15 00:48:00.761020 kernel: audit: type=1106 audit(1747270080.751:1319): pid=4284 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.761121 kernel: audit: type=1104 audit(1747270080.751:1320): pid=4284 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.751000 audit[4284]: USER_END pid=4284 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.751000 audit[4284]: CRED_DISP pid=4284 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:00.754156 systemd[1]: sshd@14-10.0.0.19:22-10.0.0.1:49678.service: Deactivated successfully. May 15 00:48:00.754900 systemd[1]: session-15.scope: Deactivated successfully. May 15 00:48:00.755497 systemd-logind[1191]: Session 15 logged out. Waiting for processes to exit. May 15 00:48:00.756319 systemd-logind[1191]: Removed session 15. May 15 00:48:00.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.19:22-10.0.0.1:49678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:00.783074 systemd-networkd[1025]: calif41b2af5073: Link UP May 15 00:48:00.785971 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 00:48:00.786078 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif41b2af5073: link becomes ready May 15 00:48:00.786217 systemd-networkd[1025]: calif41b2af5073: Gained carrier May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.644 [INFO][4287] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0 coredns-7db6d8ff4d- kube-system 19401807-1069-4dc0-9325-63f461c2adfa 980 0 2025-05-15 00:47:22 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-5xvdh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif41b2af5073 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5xvdh" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--5xvdh-" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.644 [INFO][4287] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5xvdh" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.681 [INFO][4308] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" HandleID="k8s-pod-network.ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.703 [INFO][4308] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" HandleID="k8s-pod-network.ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c5a50), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-5xvdh", "timestamp":"2025-05-15 00:48:00.681097974 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.703 [INFO][4308] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.703 [INFO][4308] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.703 [INFO][4308] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.712 [INFO][4308] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" host="localhost" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.729 [INFO][4308] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.744 [INFO][4308] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.747 [INFO][4308] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.750 [INFO][4308] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.750 [INFO][4308] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" host="localhost" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.761 [INFO][4308] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931 May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.773 [INFO][4308] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" host="localhost" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.779 [INFO][4308] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" host="localhost" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.779 [INFO][4308] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" host="localhost" May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.779 [INFO][4308] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:00.796197 env[1207]: 2025-05-15 00:48:00.780 [INFO][4308] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" HandleID="k8s-pod-network.ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:00.796807 env[1207]: 2025-05-15 00:48:00.781 [INFO][4287] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5xvdh" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"19401807-1069-4dc0-9325-63f461c2adfa", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-5xvdh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif41b2af5073", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:00.796807 env[1207]: 2025-05-15 00:48:00.781 [INFO][4287] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5xvdh" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:00.796807 env[1207]: 2025-05-15 00:48:00.781 [INFO][4287] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif41b2af5073 ContainerID="ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5xvdh" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:00.796807 env[1207]: 2025-05-15 00:48:00.786 [INFO][4287] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5xvdh" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:00.796807 env[1207]: 2025-05-15 00:48:00.787 [INFO][4287] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5xvdh" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"19401807-1069-4dc0-9325-63f461c2adfa", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931", Pod:"coredns-7db6d8ff4d-5xvdh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif41b2af5073", MAC:"ca:cd:4b:6f:e8:29", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:00.796807 env[1207]: 2025-05-15 00:48:00.794 [INFO][4287] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5xvdh" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:00.802000 audit[4331]: NETFILTER_CFG table=filter:110 family=2 entries=9 op=nft_register_rule pid=4331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:00.802000 audit[4331]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc8efaed10 a2=0 a3=7ffc8efaecfc items=0 ppid=2247 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.802000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:00.807000 audit[4331]: NETFILTER_CFG table=nat:111 family=2 entries=27 op=nft_register_chain pid=4331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:00.807000 audit[4331]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc8efaed10 a2=0 a3=7ffc8efaecfc items=0 ppid=2247 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:00.812729 env[1207]: time="2025-05-15T00:48:00.812657651Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 00:48:00.812729 env[1207]: time="2025-05-15T00:48:00.812694129Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 00:48:00.812729 env[1207]: time="2025-05-15T00:48:00.812703487Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 00:48:00.812907 env[1207]: time="2025-05-15T00:48:00.812805238Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931 pid=4343 runtime=io.containerd.runc.v2 May 15 00:48:00.820000 audit[4360]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=4360 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 00:48:00.820000 audit[4360]: SYSCALL arch=c000003e syscall=46 success=yes exit=20580 a0=3 a1=7fffa9b86440 a2=0 a3=7fffa9b8642c items=0 ppid=3443 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.820000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 00:48:00.826170 env[1207]: time="2025-05-15T00:48:00.826139299Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:00.829779 env[1207]: time="2025-05-15T00:48:00.829752484Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:00.830600 systemd[1]: run-containerd-runc-k8s.io-ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931-runc.croqOG.mount: Deactivated successfully. May 15 00:48:00.832162 systemd[1]: Started cri-containerd-ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931.scope. May 15 00:48:00.833288 env[1207]: time="2025-05-15T00:48:00.833268598Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:00.835283 env[1207]: time="2025-05-15T00:48:00.835264566Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:00.835598 env[1207]: time="2025-05-15T00:48:00.835577424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 00:48:00.839508 env[1207]: time="2025-05-15T00:48:00.839455056Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 00:48:00.840299 env[1207]: time="2025-05-15T00:48:00.840273843Z" level=info msg="CreateContainer within sandbox \"370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 00:48:00.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.843000 audit: BPF prog-id=190 op=LOAD May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4343 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563323061666432663735386565373461613465363162303930303735 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4343 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563323061666432663735386565373461613465363162303930303735 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit: BPF prog-id=191 op=LOAD May 15 00:48:00.844000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000347290 items=0 ppid=4343 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563323061666432663735386565373461613465363162303930303735 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit: BPF prog-id=192 op=LOAD May 15 00:48:00.844000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003472d8 items=0 ppid=4343 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563323061666432663735386565373461613465363162303930303735 May 15 00:48:00.844000 audit: BPF prog-id=192 op=UNLOAD May 15 00:48:00.844000 audit: BPF prog-id=191 op=UNLOAD May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.844000 audit: BPF prog-id=193 op=LOAD May 15 00:48:00.844000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003476e8 items=0 ppid=4343 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563323061666432663735386565373461613465363162303930303735 May 15 00:48:00.846465 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 00:48:00.864509 env[1207]: time="2025-05-15T00:48:00.864467588Z" level=info msg="CreateContainer within sandbox \"370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"842cfbc46b43c4b6d4f81bf366eb19ce30fda901f8c287b62fb1316095209ec5\"" May 15 00:48:00.865112 env[1207]: time="2025-05-15T00:48:00.865079848Z" level=info msg="StartContainer for \"842cfbc46b43c4b6d4f81bf366eb19ce30fda901f8c287b62fb1316095209ec5\"" May 15 00:48:00.868616 env[1207]: time="2025-05-15T00:48:00.868586153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5xvdh,Uid:19401807-1069-4dc0-9325-63f461c2adfa,Namespace:kube-system,Attempt:1,} returns sandbox id \"ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931\"" May 15 00:48:00.870525 kubelet[2048]: E0515 00:48:00.870495 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:48:00.873118 env[1207]: time="2025-05-15T00:48:00.873023056Z" level=info msg="CreateContainer within sandbox \"ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 00:48:00.887604 systemd[1]: Started cri-containerd-842cfbc46b43c4b6d4f81bf366eb19ce30fda901f8c287b62fb1316095209ec5.scope. May 15 00:48:00.890528 env[1207]: time="2025-05-15T00:48:00.889606700Z" level=info msg="CreateContainer within sandbox \"ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b24eb8dbb5511a5d6e0eec40762a318d2f518103269cbed2c2b44bacda6b3aa1\"" May 15 00:48:00.890528 env[1207]: time="2025-05-15T00:48:00.890050763Z" level=info msg="StartContainer for \"b24eb8dbb5511a5d6e0eec40762a318d2f518103269cbed2c2b44bacda6b3aa1\"" May 15 00:48:00.902000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.902000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7fd0c51fdb38 items=0 ppid=4068 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834326366626334366234336334623664346638316266333636656231 May 15 00:48:00.903000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.903000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.903000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.903000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.903000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.903000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.903000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.903000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.903000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.903000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.903000 audit: BPF prog-id=194 op=LOAD May 15 00:48:00.903000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0000d5ba8 items=0 ppid=4068 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834326366626334366234336334623664346638316266333636656231 May 15 00:48:00.905113 systemd[1]: Started cri-containerd-b24eb8dbb5511a5d6e0eec40762a318d2f518103269cbed2c2b44bacda6b3aa1.scope. May 15 00:48:00.904000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit: BPF prog-id=195 op=LOAD May 15 00:48:00.904000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0000d5bf8 items=0 ppid=4068 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834326366626334366234336334623664346638316266333636656231 May 15 00:48:00.904000 audit: BPF prog-id=195 op=UNLOAD May 15 00:48:00.904000 audit: BPF prog-id=194 op=UNLOAD May 15 00:48:00.904000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.904000 audit: BPF prog-id=196 op=LOAD May 15 00:48:00.904000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0000d5c88 items=0 ppid=4068 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834326366626334366234336334623664346638316266333636656231 May 15 00:48:00.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit: BPF prog-id=197 op=LOAD May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4343 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232346562386462623535313161356436653065656334303736326133 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4343 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232346562386462623535313161356436653065656334303736326133 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit: BPF prog-id=198 op=LOAD May 15 00:48:00.925000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003ae560 items=0 ppid=4343 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232346562386462623535313161356436653065656334303736326133 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit: BPF prog-id=199 op=LOAD May 15 00:48:00.925000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ae5a8 items=0 ppid=4343 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232346562386462623535313161356436653065656334303736326133 May 15 00:48:00.925000 audit: BPF prog-id=199 op=UNLOAD May 15 00:48:00.925000 audit: BPF prog-id=198 op=UNLOAD May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { perfmon } for pid=4409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit[4409]: AVC avc: denied { bpf } for pid=4409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:00.925000 audit: BPF prog-id=200 op=LOAD May 15 00:48:00.925000 audit[4409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003ae9b8 items=0 ppid=4343 pid=4409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:00.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232346562386462623535313161356436653065656334303736326133 May 15 00:48:01.003343 env[1207]: time="2025-05-15T00:48:01.003177834Z" level=info msg="StartContainer for \"b24eb8dbb5511a5d6e0eec40762a318d2f518103269cbed2c2b44bacda6b3aa1\" returns successfully" May 15 00:48:01.003343 env[1207]: time="2025-05-15T00:48:01.003233728Z" level=info msg="StartContainer for \"842cfbc46b43c4b6d4f81bf366eb19ce30fda901f8c287b62fb1316095209ec5\" returns successfully" May 15 00:48:01.546659 kubelet[2048]: E0515 00:48:01.546409 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:48:01.564272 kubelet[2048]: I0515 00:48:01.564205 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-5xvdh" podStartSLOduration=39.564188596 podStartE2EDuration="39.564188596s" podCreationTimestamp="2025-05-15 00:47:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 00:48:01.555444395 +0000 UTC m=+53.259788022" watchObservedRunningTime="2025-05-15 00:48:01.564188596 +0000 UTC m=+53.268532223" May 15 00:48:01.813357 systemd-networkd[1025]: calif41b2af5073: Gained IPv6LL May 15 00:48:01.822000 audit[4456]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=4456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:01.822000 audit[4456]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc4fe4f830 a2=0 a3=7ffc4fe4f81c items=0 ppid=2247 pid=4456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:01.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:01.836000 audit[4456]: NETFILTER_CFG table=nat:114 family=2 entries=58 op=nft_register_chain pid=4456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:01.836000 audit[4456]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffc4fe4f830 a2=0 a3=7ffc4fe4f81c items=0 ppid=2247 pid=4456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:01.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:02.550435 kubelet[2048]: E0515 00:48:02.550344 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:48:02.917063 env[1207]: time="2025-05-15T00:48:02.916918219Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:02.918838 env[1207]: time="2025-05-15T00:48:02.918811874Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:02.920307 env[1207]: time="2025-05-15T00:48:02.920275143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:02.921725 env[1207]: time="2025-05-15T00:48:02.921699837Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:02.922084 env[1207]: time="2025-05-15T00:48:02.922045056Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 00:48:02.923264 env[1207]: time="2025-05-15T00:48:02.923012703Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 00:48:02.928042 env[1207]: time="2025-05-15T00:48:02.928004216Z" level=info msg="CreateContainer within sandbox \"c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 00:48:02.941834 env[1207]: time="2025-05-15T00:48:02.941791316Z" level=info msg="CreateContainer within sandbox \"c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c1b93074ac287fb27b7ac7ab7ecbf7987e658091473003e35a0d281490bc6dfa\"" May 15 00:48:02.943151 env[1207]: time="2025-05-15T00:48:02.942473326Z" level=info msg="StartContainer for \"c1b93074ac287fb27b7ac7ab7ecbf7987e658091473003e35a0d281490bc6dfa\"" May 15 00:48:02.959308 systemd[1]: Started cri-containerd-c1b93074ac287fb27b7ac7ab7ecbf7987e658091473003e35a0d281490bc6dfa.scope. May 15 00:48:02.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit: BPF prog-id=201 op=LOAD May 15 00:48:02.967000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4058 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:02.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331623933303734616332383766623237623761633761623765636266 May 15 00:48:02.967000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4058 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:02.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331623933303734616332383766623237623761633761623765636266 May 15 00:48:02.967000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.967000 audit: BPF prog-id=202 op=LOAD May 15 00:48:02.967000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002892c0 items=0 ppid=4058 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:02.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331623933303734616332383766623237623761633761623765636266 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit: BPF prog-id=203 op=LOAD May 15 00:48:02.968000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000289308 items=0 ppid=4058 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:02.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331623933303734616332383766623237623761633761623765636266 May 15 00:48:02.968000 audit: BPF prog-id=203 op=UNLOAD May 15 00:48:02.968000 audit: BPF prog-id=202 op=UNLOAD May 15 00:48:02.968000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:02.968000 audit: BPF prog-id=204 op=LOAD May 15 00:48:02.968000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000289718 items=0 ppid=4058 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:02.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331623933303734616332383766623237623761633761623765636266 May 15 00:48:02.992823 env[1207]: time="2025-05-15T00:48:02.992778047Z" level=info msg="StartContainer for \"c1b93074ac287fb27b7ac7ab7ecbf7987e658091473003e35a0d281490bc6dfa\" returns successfully" May 15 00:48:03.557023 kubelet[2048]: E0515 00:48:03.556994 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:48:03.586629 kubelet[2048]: I0515 00:48:03.586566 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7df9b79fbf-pdk5w" podStartSLOduration=28.943070281 podStartE2EDuration="33.586546801s" podCreationTimestamp="2025-05-15 00:47:30 +0000 UTC" firstStartedPulling="2025-05-15 00:47:58.279388155 +0000 UTC m=+49.983731772" lastFinishedPulling="2025-05-15 00:48:02.922864665 +0000 UTC m=+54.627208292" observedRunningTime="2025-05-15 00:48:03.586081978 +0000 UTC m=+55.290425595" watchObservedRunningTime="2025-05-15 00:48:03.586546801 +0000 UTC m=+55.290890429" May 15 00:48:04.285000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:04.285000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001efe4e0 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:48:04.285000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:48:04.285000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:04.285000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00090f230 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:48:04.285000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:48:04.850000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:04.850000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:04.850000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00812b590 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:48:04.850000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:48:04.850000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c009dc8940 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:48:04.850000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:48:04.850000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:04.850000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c008fea810 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:48:04.850000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:48:04.858000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:04.858000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0099584b0 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:48:04.858000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:48:04.860000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:04.860000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0070565a0 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:48:04.860000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:48:04.873000 audit[1915]: AVC avc: denied { watch } for pid=1915 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:04.873000 audit[1915]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c008feb410 a2=fc6 a3=0 items=0 ppid=1783 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c74,c157 key=(null) May 15 00:48:04.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3139002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 00:48:05.334345 env[1207]: time="2025-05-15T00:48:05.334255183Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:05.337211 env[1207]: time="2025-05-15T00:48:05.336940725Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:05.338571 env[1207]: time="2025-05-15T00:48:05.338273888Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:05.340398 env[1207]: time="2025-05-15T00:48:05.340346249Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 00:48:05.340701 env[1207]: time="2025-05-15T00:48:05.340666280Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 00:48:05.343339 env[1207]: time="2025-05-15T00:48:05.343286079Z" level=info msg="CreateContainer within sandbox \"370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 00:48:05.359705 env[1207]: time="2025-05-15T00:48:05.359653910Z" level=info msg="CreateContainer within sandbox \"370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"58227d1e755d1f204bb428718012282f9e7bcee92aad14a03199b7f5a089683d\"" May 15 00:48:05.360374 env[1207]: time="2025-05-15T00:48:05.360259056Z" level=info msg="StartContainer for \"58227d1e755d1f204bb428718012282f9e7bcee92aad14a03199b7f5a089683d\"" May 15 00:48:05.379014 systemd[1]: Started cri-containerd-58227d1e755d1f204bb428718012282f9e7bcee92aad14a03199b7f5a089683d.scope. May 15 00:48:05.390000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.390000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f27f070b8c8 items=0 ppid=4068 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:05.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323237643165373535643166323034626234323837313830313232 May 15 00:48:05.390000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.390000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.390000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.390000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.390000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.390000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.390000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.390000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.390000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.390000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.390000 audit: BPF prog-id=205 op=LOAD May 15 00:48:05.390000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000205088 items=0 ppid=4068 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:05.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323237643165373535643166323034626234323837313830313232 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit: BPF prog-id=206 op=LOAD May 15 00:48:05.391000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002050d8 items=0 ppid=4068 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:05.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323237643165373535643166323034626234323837313830313232 May 15 00:48:05.391000 audit: BPF prog-id=206 op=UNLOAD May 15 00:48:05.391000 audit: BPF prog-id=205 op=UNLOAD May 15 00:48:05.391000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 00:48:05.391000 audit: BPF prog-id=207 op=LOAD May 15 00:48:05.391000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000205168 items=0 ppid=4068 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:05.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323237643165373535643166323034626234323837313830313232 May 15 00:48:05.437080 env[1207]: time="2025-05-15T00:48:05.437035187Z" level=info msg="StartContainer for \"58227d1e755d1f204bb428718012282f9e7bcee92aad14a03199b7f5a089683d\" returns successfully" May 15 00:48:05.447767 kubelet[2048]: I0515 00:48:05.447742 2048 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 00:48:05.447767 kubelet[2048]: I0515 00:48:05.447771 2048 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 00:48:05.571068 systemd[1]: run-containerd-runc-k8s.io-58227d1e755d1f204bb428718012282f9e7bcee92aad14a03199b7f5a089683d-runc.ybYDy8.mount: Deactivated successfully. May 15 00:48:05.622250 kubelet[2048]: I0515 00:48:05.622019 2048 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-gjf4x" podStartSLOduration=28.542030239 podStartE2EDuration="35.622000109s" podCreationTimestamp="2025-05-15 00:47:30 +0000 UTC" firstStartedPulling="2025-05-15 00:47:58.261510298 +0000 UTC m=+49.965853925" lastFinishedPulling="2025-05-15 00:48:05.341480178 +0000 UTC m=+57.045823795" observedRunningTime="2025-05-15 00:48:05.621390815 +0000 UTC m=+57.325734442" watchObservedRunningTime="2025-05-15 00:48:05.622000109 +0000 UTC m=+57.326343736" May 15 00:48:05.756297 systemd[1]: Started sshd@15-10.0.0.19:22-10.0.0.1:49686.service. May 15 00:48:05.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.19:22-10.0.0.1:49686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:05.757389 kernel: kauditd_printk_skb: 297 callbacks suppressed May 15 00:48:05.757465 kernel: audit: type=1130 audit(1747270085.755:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.19:22-10.0.0.1:49686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:05.788000 audit[4557]: USER_ACCT pid=4557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.790532 sshd[4557]: Accepted publickey for core from 10.0.0.1 port 49686 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:05.791813 sshd[4557]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:05.790000 audit[4557]: CRED_ACQ pid=4557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.795741 systemd-logind[1191]: New session 16 of user core. May 15 00:48:05.796509 systemd[1]: Started session-16.scope. May 15 00:48:05.799192 kernel: audit: type=1101 audit(1747270085.788:1402): pid=4557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.799273 kernel: audit: type=1103 audit(1747270085.790:1403): pid=4557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.799319 kernel: audit: type=1006 audit(1747270085.790:1404): pid=4557 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 00:48:05.790000 audit[4557]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe14098ff0 a2=3 a3=0 items=0 ppid=1 pid=4557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:05.806845 kernel: audit: type=1300 audit(1747270085.790:1404): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe14098ff0 a2=3 a3=0 items=0 ppid=1 pid=4557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:05.806939 kernel: audit: type=1327 audit(1747270085.790:1404): proctitle=737368643A20636F7265205B707269765D May 15 00:48:05.790000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:05.801000 audit[4557]: USER_START pid=4557 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.813496 kernel: audit: type=1105 audit(1747270085.801:1405): pid=4557 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.813538 kernel: audit: type=1103 audit(1747270085.802:1406): pid=4559 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.802000 audit[4559]: CRED_ACQ pid=4559 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.917685 sshd[4557]: pam_unix(sshd:session): session closed for user core May 15 00:48:05.917000 audit[4557]: USER_END pid=4557 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.919998 systemd[1]: sshd@15-10.0.0.19:22-10.0.0.1:49686.service: Deactivated successfully. May 15 00:48:05.920711 systemd[1]: session-16.scope: Deactivated successfully. May 15 00:48:05.922035 systemd-logind[1191]: Session 16 logged out. Waiting for processes to exit. May 15 00:48:05.922945 systemd-logind[1191]: Removed session 16. May 15 00:48:05.917000 audit[4557]: CRED_DISP pid=4557 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.926571 kernel: audit: type=1106 audit(1747270085.917:1407): pid=4557 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.926632 kernel: audit: type=1104 audit(1747270085.917:1408): pid=4557 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:05.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.19:22-10.0.0.1:49686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:06.938561 kubelet[2048]: E0515 00:48:06.938521 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:48:08.363718 env[1207]: time="2025-05-15T00:48:08.363678754Z" level=info msg="StopPodSandbox for \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\"" May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.402 [WARNING][4614] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0", GenerateName:"calico-kube-controllers-7df9b79fbf-", Namespace:"calico-system", SelfLink:"", UID:"5781e7f0-4915-430d-8593-cc1b96c9c3c4", ResourceVersion:"1030", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7df9b79fbf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86", Pod:"calico-kube-controllers-7df9b79fbf-pdk5w", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali25ac648ff3b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.403 [INFO][4614] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.403 [INFO][4614] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" iface="eth0" netns="" May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.403 [INFO][4614] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.403 [INFO][4614] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.420 [INFO][4624] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" HandleID="k8s-pod-network.e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.420 [INFO][4624] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.420 [INFO][4624] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.427 [WARNING][4624] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" HandleID="k8s-pod-network.e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.427 [INFO][4624] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" HandleID="k8s-pod-network.e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.428 [INFO][4624] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:08.431168 env[1207]: 2025-05-15 00:48:08.429 [INFO][4614] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:48:08.436058 env[1207]: time="2025-05-15T00:48:08.431189827Z" level=info msg="TearDown network for sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\" successfully" May 15 00:48:08.436058 env[1207]: time="2025-05-15T00:48:08.431212760Z" level=info msg="StopPodSandbox for \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\" returns successfully" May 15 00:48:08.436058 env[1207]: time="2025-05-15T00:48:08.431619924Z" level=info msg="RemovePodSandbox for \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\"" May 15 00:48:08.436058 env[1207]: time="2025-05-15T00:48:08.431649670Z" level=info msg="Forcibly stopping sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\"" May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.465 [WARNING][4647] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0", GenerateName:"calico-kube-controllers-7df9b79fbf-", Namespace:"calico-system", SelfLink:"", UID:"5781e7f0-4915-430d-8593-cc1b96c9c3c4", ResourceVersion:"1030", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7df9b79fbf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c3b89e6130b65c7bfd344a8146b360408cf3e1c87bdb7ba8c00cee1e074a5a86", Pod:"calico-kube-controllers-7df9b79fbf-pdk5w", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali25ac648ff3b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.465 [INFO][4647] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.465 [INFO][4647] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" iface="eth0" netns="" May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.465 [INFO][4647] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.465 [INFO][4647] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.483 [INFO][4656] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" HandleID="k8s-pod-network.e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.483 [INFO][4656] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.483 [INFO][4656] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.488 [WARNING][4656] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" HandleID="k8s-pod-network.e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.488 [INFO][4656] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" HandleID="k8s-pod-network.e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" Workload="localhost-k8s-calico--kube--controllers--7df9b79fbf--pdk5w-eth0" May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.489 [INFO][4656] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:08.492639 env[1207]: 2025-05-15 00:48:08.491 [INFO][4647] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2" May 15 00:48:08.493178 env[1207]: time="2025-05-15T00:48:08.492666500Z" level=info msg="TearDown network for sandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\" successfully" May 15 00:48:08.685479 env[1207]: time="2025-05-15T00:48:08.685363170Z" level=info msg="RemovePodSandbox \"e4ccdf5bc15a71ea45f04cc999c683829091dec647813392abcd3110af0a31b2\" returns successfully" May 15 00:48:08.686520 env[1207]: time="2025-05-15T00:48:08.686486048Z" level=info msg="StopPodSandbox for \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\"" May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.718 [WARNING][4679] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"378dde4c-1f84-4b06-8c25-00678d54c37b", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417", Pod:"coredns-7db6d8ff4d-ddhvw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc14d2cf48e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.718 [INFO][4679] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.718 [INFO][4679] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" iface="eth0" netns="" May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.718 [INFO][4679] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.718 [INFO][4679] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.736 [INFO][4687] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" HandleID="k8s-pod-network.c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.736 [INFO][4687] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.736 [INFO][4687] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.741 [WARNING][4687] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" HandleID="k8s-pod-network.c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.741 [INFO][4687] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" HandleID="k8s-pod-network.c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.743 [INFO][4687] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:08.746059 env[1207]: 2025-05-15 00:48:08.744 [INFO][4679] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:48:08.746839 env[1207]: time="2025-05-15T00:48:08.746070499Z" level=info msg="TearDown network for sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\" successfully" May 15 00:48:08.746839 env[1207]: time="2025-05-15T00:48:08.746103311Z" level=info msg="StopPodSandbox for \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\" returns successfully" May 15 00:48:08.746839 env[1207]: time="2025-05-15T00:48:08.746675605Z" level=info msg="RemovePodSandbox for \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\"" May 15 00:48:08.746839 env[1207]: time="2025-05-15T00:48:08.746720650Z" level=info msg="Forcibly stopping sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\"" May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.777 [WARNING][4709] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"378dde4c-1f84-4b06-8c25-00678d54c37b", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0d67b383075b2ca6be7786f71fda360eae9e0b7da566b7545700a6b73f4eb417", Pod:"coredns-7db6d8ff4d-ddhvw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc14d2cf48e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.777 [INFO][4709] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.777 [INFO][4709] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" iface="eth0" netns="" May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.777 [INFO][4709] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.777 [INFO][4709] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.797 [INFO][4717] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" HandleID="k8s-pod-network.c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.797 [INFO][4717] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.797 [INFO][4717] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.803 [WARNING][4717] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" HandleID="k8s-pod-network.c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.804 [INFO][4717] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" HandleID="k8s-pod-network.c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" Workload="localhost-k8s-coredns--7db6d8ff4d--ddhvw-eth0" May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.805 [INFO][4717] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:08.809464 env[1207]: 2025-05-15 00:48:08.807 [INFO][4709] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466" May 15 00:48:08.810015 env[1207]: time="2025-05-15T00:48:08.809467588Z" level=info msg="TearDown network for sandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\" successfully" May 15 00:48:08.813360 env[1207]: time="2025-05-15T00:48:08.813272641Z" level=info msg="RemovePodSandbox \"c033ca3cc15b4cdecfb32e425590101a6146abc4e9b6af1156dee50263b6a466\" returns successfully" May 15 00:48:08.813948 env[1207]: time="2025-05-15T00:48:08.813898737Z" level=info msg="StopPodSandbox for \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\"" May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.849 [WARNING][4739] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0", GenerateName:"calico-apiserver-789d76996-", Namespace:"calico-apiserver", SelfLink:"", UID:"05f35d15-5b08-4df6-bd81-0d251d912643", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789d76996", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4", Pod:"calico-apiserver-789d76996-zb2pp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1cbe480fdac", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.849 [INFO][4739] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.849 [INFO][4739] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" iface="eth0" netns="" May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.849 [INFO][4739] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.849 [INFO][4739] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.870 [INFO][4747] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" HandleID="k8s-pod-network.46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.870 [INFO][4747] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.870 [INFO][4747] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.877 [WARNING][4747] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" HandleID="k8s-pod-network.46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.877 [INFO][4747] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" HandleID="k8s-pod-network.46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.878 [INFO][4747] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:08.882177 env[1207]: 2025-05-15 00:48:08.880 [INFO][4739] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:48:08.882727 env[1207]: time="2025-05-15T00:48:08.882227093Z" level=info msg="TearDown network for sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\" successfully" May 15 00:48:08.882727 env[1207]: time="2025-05-15T00:48:08.882284631Z" level=info msg="StopPodSandbox for \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\" returns successfully" May 15 00:48:08.882859 env[1207]: time="2025-05-15T00:48:08.882801091Z" level=info msg="RemovePodSandbox for \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\"" May 15 00:48:08.882910 env[1207]: time="2025-05-15T00:48:08.882845384Z" level=info msg="Forcibly stopping sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\"" May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.918 [WARNING][4769] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0", GenerateName:"calico-apiserver-789d76996-", Namespace:"calico-apiserver", SelfLink:"", UID:"05f35d15-5b08-4df6-bd81-0d251d912643", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789d76996", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"43bb7062c04d87aaf6b1939ce72622463dd5bb2ea3fb4704476edcffa6982df4", Pod:"calico-apiserver-789d76996-zb2pp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1cbe480fdac", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.918 [INFO][4769] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.918 [INFO][4769] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" iface="eth0" netns="" May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.918 [INFO][4769] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.918 [INFO][4769] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.940 [INFO][4778] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" HandleID="k8s-pod-network.46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.940 [INFO][4778] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.940 [INFO][4778] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.945 [WARNING][4778] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" HandleID="k8s-pod-network.46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.945 [INFO][4778] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" HandleID="k8s-pod-network.46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" Workload="localhost-k8s-calico--apiserver--789d76996--zb2pp-eth0" May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.947 [INFO][4778] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:08.950147 env[1207]: 2025-05-15 00:48:08.948 [INFO][4769] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18" May 15 00:48:08.950147 env[1207]: time="2025-05-15T00:48:08.950100345Z" level=info msg="TearDown network for sandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\" successfully" May 15 00:48:09.006542 env[1207]: time="2025-05-15T00:48:09.006492663Z" level=info msg="RemovePodSandbox \"46e2999ce66906fcc8a7e1d4023b13f6807bdcde56b7b81f2abf992c86ab3e18\" returns successfully" May 15 00:48:09.006989 env[1207]: time="2025-05-15T00:48:09.006967535Z" level=info msg="StopPodSandbox for \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\"" May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.036 [WARNING][4800] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"19401807-1069-4dc0-9325-63f461c2adfa", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931", Pod:"coredns-7db6d8ff4d-5xvdh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif41b2af5073", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.036 [INFO][4800] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.036 [INFO][4800] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" iface="eth0" netns="" May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.036 [INFO][4800] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.036 [INFO][4800] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.052 [INFO][4808] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" HandleID="k8s-pod-network.84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.052 [INFO][4808] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.052 [INFO][4808] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.057 [WARNING][4808] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" HandleID="k8s-pod-network.84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.057 [INFO][4808] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" HandleID="k8s-pod-network.84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.058 [INFO][4808] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:09.060511 env[1207]: 2025-05-15 00:48:09.059 [INFO][4800] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:09.060975 env[1207]: time="2025-05-15T00:48:09.060533784Z" level=info msg="TearDown network for sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\" successfully" May 15 00:48:09.060975 env[1207]: time="2025-05-15T00:48:09.060568019Z" level=info msg="StopPodSandbox for \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\" returns successfully" May 15 00:48:09.061081 env[1207]: time="2025-05-15T00:48:09.061048120Z" level=info msg="RemovePodSandbox for \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\"" May 15 00:48:09.061130 env[1207]: time="2025-05-15T00:48:09.061091382Z" level=info msg="Forcibly stopping sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\"" May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.089 [WARNING][4830] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"19401807-1069-4dc0-9325-63f461c2adfa", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ec20afd2f758ee74aa4e61b090075dfe8c07be7104f2347de70f1b044479c931", Pod:"coredns-7db6d8ff4d-5xvdh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif41b2af5073", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.089 [INFO][4830] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.089 [INFO][4830] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" iface="eth0" netns="" May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.089 [INFO][4830] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.089 [INFO][4830] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.106 [INFO][4838] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" HandleID="k8s-pod-network.84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.106 [INFO][4838] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.106 [INFO][4838] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.130 [WARNING][4838] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" HandleID="k8s-pod-network.84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.130 [INFO][4838] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" HandleID="k8s-pod-network.84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" Workload="localhost-k8s-coredns--7db6d8ff4d--5xvdh-eth0" May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.133 [INFO][4838] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:09.139128 env[1207]: 2025-05-15 00:48:09.137 [INFO][4830] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0" May 15 00:48:09.139751 env[1207]: time="2025-05-15T00:48:09.139712767Z" level=info msg="TearDown network for sandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\" successfully" May 15 00:48:09.194524 env[1207]: time="2025-05-15T00:48:09.194452469Z" level=info msg="RemovePodSandbox \"84ea529c978683089c1296e20a654c98b91483463a463d591dc3f9927fb716b0\" returns successfully" May 15 00:48:09.194950 env[1207]: time="2025-05-15T00:48:09.194927281Z" level=info msg="StopPodSandbox for \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\"" May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.225 [WARNING][4861] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--gjf4x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e18a49a0-35d4-453b-952b-0a4f021f03ad", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2", Pod:"csi-node-driver-gjf4x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2c16ff710e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.225 [INFO][4861] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.225 [INFO][4861] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" iface="eth0" netns="" May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.226 [INFO][4861] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.226 [INFO][4861] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.246 [INFO][4869] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" HandleID="k8s-pod-network.8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.246 [INFO][4869] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.246 [INFO][4869] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.251 [WARNING][4869] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" HandleID="k8s-pod-network.8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.251 [INFO][4869] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" HandleID="k8s-pod-network.8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.252 [INFO][4869] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:09.255228 env[1207]: 2025-05-15 00:48:09.253 [INFO][4861] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:48:09.255690 env[1207]: time="2025-05-15T00:48:09.255265754Z" level=info msg="TearDown network for sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\" successfully" May 15 00:48:09.255690 env[1207]: time="2025-05-15T00:48:09.255300950Z" level=info msg="StopPodSandbox for \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\" returns successfully" May 15 00:48:09.255793 env[1207]: time="2025-05-15T00:48:09.255770211Z" level=info msg="RemovePodSandbox for \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\"" May 15 00:48:09.257840 env[1207]: time="2025-05-15T00:48:09.255799797Z" level=info msg="Forcibly stopping sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\"" May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.288 [WARNING][4891] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--gjf4x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e18a49a0-35d4-453b-952b-0a4f021f03ad", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"370ceafeab11a386fa3431547d79ef277daeb5fe8e8ddb1f4aca5df869ed32f2", Pod:"csi-node-driver-gjf4x", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2c16ff710e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.288 [INFO][4891] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.288 [INFO][4891] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" iface="eth0" netns="" May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.288 [INFO][4891] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.288 [INFO][4891] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.306 [INFO][4900] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" HandleID="k8s-pod-network.8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.307 [INFO][4900] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.307 [INFO][4900] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.313 [WARNING][4900] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" HandleID="k8s-pod-network.8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.313 [INFO][4900] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" HandleID="k8s-pod-network.8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" Workload="localhost-k8s-csi--node--driver--gjf4x-eth0" May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.314 [INFO][4900] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:09.317139 env[1207]: 2025-05-15 00:48:09.315 [INFO][4891] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919" May 15 00:48:09.317751 env[1207]: time="2025-05-15T00:48:09.317153415Z" level=info msg="TearDown network for sandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\" successfully" May 15 00:48:09.322888 env[1207]: time="2025-05-15T00:48:09.322863575Z" level=info msg="RemovePodSandbox \"8204f7220716cffe3b1721a390dbb71101870698af1492dc57c06175ae096919\" returns successfully" May 15 00:48:09.323348 env[1207]: time="2025-05-15T00:48:09.323321073Z" level=info msg="StopPodSandbox for \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\"" May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.352 [WARNING][4923] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0", GenerateName:"calico-apiserver-789d76996-", Namespace:"calico-apiserver", SelfLink:"", UID:"3b5565d8-a2c6-4be6-a224-b5f9a83d4786", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789d76996", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33", Pod:"calico-apiserver-789d76996-w2bm7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidad0251099e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.353 [INFO][4923] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.353 [INFO][4923] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" iface="eth0" netns="" May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.353 [INFO][4923] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.353 [INFO][4923] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.370 [INFO][4931] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" HandleID="k8s-pod-network.e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.370 [INFO][4931] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.370 [INFO][4931] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.375 [WARNING][4931] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" HandleID="k8s-pod-network.e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.375 [INFO][4931] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" HandleID="k8s-pod-network.e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.376 [INFO][4931] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:09.379909 env[1207]: 2025-05-15 00:48:09.378 [INFO][4923] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:48:09.380599 env[1207]: time="2025-05-15T00:48:09.379930577Z" level=info msg="TearDown network for sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\" successfully" May 15 00:48:09.380599 env[1207]: time="2025-05-15T00:48:09.379960403Z" level=info msg="StopPodSandbox for \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\" returns successfully" May 15 00:48:09.380599 env[1207]: time="2025-05-15T00:48:09.380418933Z" level=info msg="RemovePodSandbox for \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\"" May 15 00:48:09.380599 env[1207]: time="2025-05-15T00:48:09.380444351Z" level=info msg="Forcibly stopping sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\"" May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.411 [WARNING][4954] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0", GenerateName:"calico-apiserver-789d76996-", Namespace:"calico-apiserver", SelfLink:"", UID:"3b5565d8-a2c6-4be6-a224-b5f9a83d4786", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 0, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"789d76996", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0721e248479b2387f0446df0b9989bffb23b25e98d728b2fc9138f1507077a33", Pod:"calico-apiserver-789d76996-w2bm7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidad0251099e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.411 [INFO][4954] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.411 [INFO][4954] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" iface="eth0" netns="" May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.411 [INFO][4954] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.411 [INFO][4954] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.432 [INFO][4963] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" HandleID="k8s-pod-network.e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.432 [INFO][4963] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.432 [INFO][4963] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.437 [WARNING][4963] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" HandleID="k8s-pod-network.e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.437 [INFO][4963] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" HandleID="k8s-pod-network.e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" Workload="localhost-k8s-calico--apiserver--789d76996--w2bm7-eth0" May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.438 [INFO][4963] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 00:48:09.441736 env[1207]: 2025-05-15 00:48:09.440 [INFO][4954] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145" May 15 00:48:09.442352 env[1207]: time="2025-05-15T00:48:09.441780647Z" level=info msg="TearDown network for sandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\" successfully" May 15 00:48:09.449370 env[1207]: time="2025-05-15T00:48:09.449322426Z" level=info msg="RemovePodSandbox \"e631ca8f5cf69347416a820357966c9e52ea41307ec2df2854fd0ea3b9364145\" returns successfully" May 15 00:48:10.921736 systemd[1]: Started sshd@16-10.0.0.19:22-10.0.0.1:59034.service. May 15 00:48:10.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.19:22-10.0.0.1:59034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:10.922772 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:48:10.922837 kernel: audit: type=1130 audit(1747270090.920:1410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.19:22-10.0.0.1:59034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:10.953000 audit[4974]: USER_ACCT pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:10.955220 sshd[4974]: Accepted publickey for core from 10.0.0.1 port 59034 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:10.962982 kernel: audit: type=1101 audit(1747270090.953:1411): pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:10.963122 kernel: audit: type=1103 audit(1747270090.955:1412): pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:10.955000 audit[4974]: CRED_ACQ pid=4974 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:10.959157 sshd[4974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:10.963430 systemd-logind[1191]: New session 17 of user core. May 15 00:48:10.963919 systemd[1]: Started session-17.scope. May 15 00:48:10.955000 audit[4974]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff499887f0 a2=3 a3=0 items=0 ppid=1 pid=4974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:10.970652 kernel: audit: type=1006 audit(1747270090.955:1413): pid=4974 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 15 00:48:10.970734 kernel: audit: type=1300 audit(1747270090.955:1413): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff499887f0 a2=3 a3=0 items=0 ppid=1 pid=4974 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:10.955000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:10.972194 kernel: audit: type=1327 audit(1747270090.955:1413): proctitle=737368643A20636F7265205B707269765D May 15 00:48:10.972250 kernel: audit: type=1105 audit(1747270090.967:1414): pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:10.967000 audit[4974]: USER_START pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:10.981264 kernel: audit: type=1103 audit(1747270090.968:1415): pid=4976 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:10.968000 audit[4976]: CRED_ACQ pid=4976 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:11.073871 sshd[4974]: pam_unix(sshd:session): session closed for user core May 15 00:48:11.073000 audit[4974]: USER_END pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:11.076512 systemd[1]: sshd@16-10.0.0.19:22-10.0.0.1:59034.service: Deactivated successfully. May 15 00:48:11.077252 systemd[1]: session-17.scope: Deactivated successfully. May 15 00:48:11.077807 systemd-logind[1191]: Session 17 logged out. Waiting for processes to exit. May 15 00:48:11.078476 systemd-logind[1191]: Removed session 17. May 15 00:48:11.073000 audit[4974]: CRED_DISP pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:11.082955 kernel: audit: type=1106 audit(1747270091.073:1416): pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:11.083005 kernel: audit: type=1104 audit(1747270091.073:1417): pid=4974 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:11.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.19:22-10.0.0.1:59034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:16.078410 systemd[1]: Started sshd@17-10.0.0.19:22-10.0.0.1:59044.service. May 15 00:48:16.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.19:22-10.0.0.1:59044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:16.079753 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:48:16.079864 kernel: audit: type=1130 audit(1747270096.078:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.19:22-10.0.0.1:59044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:16.111000 audit[5028]: USER_ACCT pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.112330 sshd[5028]: Accepted publickey for core from 10.0.0.1 port 59044 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:16.115000 audit[5028]: CRED_ACQ pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.116500 sshd[5028]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:16.127275 kernel: audit: type=1101 audit(1747270096.111:1420): pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.127354 kernel: audit: type=1103 audit(1747270096.115:1421): pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.127383 kernel: audit: type=1006 audit(1747270096.115:1422): pid=5028 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 15 00:48:16.127402 kernel: audit: type=1300 audit(1747270096.115:1422): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec2003910 a2=3 a3=0 items=0 ppid=1 pid=5028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:16.127419 kernel: audit: type=1327 audit(1747270096.115:1422): proctitle=737368643A20636F7265205B707269765D May 15 00:48:16.115000 audit[5028]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec2003910 a2=3 a3=0 items=0 ppid=1 pid=5028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:16.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:16.120917 systemd-logind[1191]: New session 18 of user core. May 15 00:48:16.121681 systemd[1]: Started session-18.scope. May 15 00:48:16.128000 audit[5028]: USER_START pid=5028 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.129000 audit[5030]: CRED_ACQ pid=5030 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.136588 kernel: audit: type=1105 audit(1747270096.128:1423): pid=5028 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.136681 kernel: audit: type=1103 audit(1747270096.129:1424): pid=5030 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.237131 sshd[5028]: pam_unix(sshd:session): session closed for user core May 15 00:48:16.238000 audit[5028]: USER_END pid=5028 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.240421 systemd[1]: sshd@17-10.0.0.19:22-10.0.0.1:59044.service: Deactivated successfully. May 15 00:48:16.240931 systemd[1]: session-18.scope: Deactivated successfully. May 15 00:48:16.241763 systemd-logind[1191]: Session 18 logged out. Waiting for processes to exit. May 15 00:48:16.238000 audit[5028]: CRED_DISP pid=5028 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.243973 systemd[1]: Started sshd@18-10.0.0.19:22-10.0.0.1:59046.service. May 15 00:48:16.244874 systemd-logind[1191]: Removed session 18. May 15 00:48:16.247479 kernel: audit: type=1106 audit(1747270096.238:1425): pid=5028 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.247540 kernel: audit: type=1104 audit(1747270096.238:1426): pid=5028 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.19:22-10.0.0.1:59044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:16.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.19:22-10.0.0.1:59046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:16.273000 audit[5047]: USER_ACCT pid=5047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.274404 sshd[5047]: Accepted publickey for core from 10.0.0.1 port 59046 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:16.274000 audit[5047]: CRED_ACQ pid=5047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.274000 audit[5047]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefa4d6fa0 a2=3 a3=0 items=0 ppid=1 pid=5047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:16.274000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:16.275155 sshd[5047]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:16.279726 systemd-logind[1191]: New session 19 of user core. May 15 00:48:16.280498 systemd[1]: Started session-19.scope. May 15 00:48:16.286000 audit[5047]: USER_START pid=5047 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.288000 audit[5049]: CRED_ACQ pid=5049 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.763682 sshd[5047]: pam_unix(sshd:session): session closed for user core May 15 00:48:16.764000 audit[5047]: USER_END pid=5047 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.764000 audit[5047]: CRED_DISP pid=5047 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.766557 systemd[1]: sshd@18-10.0.0.19:22-10.0.0.1:59046.service: Deactivated successfully. May 15 00:48:16.767088 systemd[1]: session-19.scope: Deactivated successfully. May 15 00:48:16.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.19:22-10.0.0.1:59046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:16.767805 systemd-logind[1191]: Session 19 logged out. Waiting for processes to exit. May 15 00:48:16.768787 systemd[1]: Started sshd@19-10.0.0.19:22-10.0.0.1:35194.service. May 15 00:48:16.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.19:22-10.0.0.1:35194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:16.769551 systemd-logind[1191]: Removed session 19. May 15 00:48:16.800000 audit[5059]: USER_ACCT pid=5059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.801525 sshd[5059]: Accepted publickey for core from 10.0.0.1 port 35194 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:16.802000 audit[5059]: CRED_ACQ pid=5059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.802000 audit[5059]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe094e0860 a2=3 a3=0 items=0 ppid=1 pid=5059 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:16.802000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:16.802907 sshd[5059]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:16.806593 systemd-logind[1191]: New session 20 of user core. May 15 00:48:16.807388 systemd[1]: Started session-20.scope. May 15 00:48:16.810000 audit[5059]: USER_START pid=5059 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:16.811000 audit[5061]: CRED_ACQ pid=5061 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.429000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:18.430000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:18.430000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:18.430000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002297c60 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:48:18.430000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:48:18.430000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c184c0 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:48:18.430000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:48:18.431000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 00:48:18.431000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001764460 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:48:18.431000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:48:18.429000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001eff940 a2=fc6 a3=0 items=0 ppid=1743 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c249 key=(null) May 15 00:48:18.429000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 00:48:18.457000 audit[5072]: NETFILTER_CFG table=filter:115 family=2 entries=20 op=nft_register_rule pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:18.457000 audit[5072]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc34d67040 a2=0 a3=7ffc34d6702c items=0 ppid=2247 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:18.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:18.467000 audit[5072]: NETFILTER_CFG table=nat:116 family=2 entries=22 op=nft_register_rule pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:18.467000 audit[5072]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc34d67040 a2=0 a3=0 items=0 ppid=2247 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:18.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:18.470127 sshd[5059]: pam_unix(sshd:session): session closed for user core May 15 00:48:18.470000 audit[5059]: USER_END pid=5059 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.470000 audit[5059]: CRED_DISP pid=5059 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.474303 systemd[1]: Started sshd@20-10.0.0.19:22-10.0.0.1:35198.service. May 15 00:48:18.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.19:22-10.0.0.1:35198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:18.476816 systemd[1]: sshd@19-10.0.0.19:22-10.0.0.1:35194.service: Deactivated successfully. May 15 00:48:18.477388 systemd[1]: session-20.scope: Deactivated successfully. May 15 00:48:18.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.19:22-10.0.0.1:35194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:18.478367 systemd-logind[1191]: Session 20 logged out. Waiting for processes to exit. May 15 00:48:18.479127 systemd-logind[1191]: Removed session 20. May 15 00:48:18.483000 audit[5077]: NETFILTER_CFG table=filter:117 family=2 entries=32 op=nft_register_rule pid=5077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:18.483000 audit[5077]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd2d7be3a0 a2=0 a3=7ffd2d7be38c items=0 ppid=2247 pid=5077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:18.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:18.487000 audit[5077]: NETFILTER_CFG table=nat:118 family=2 entries=22 op=nft_register_rule pid=5077 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:18.487000 audit[5077]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd2d7be3a0 a2=0 a3=0 items=0 ppid=2247 pid=5077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:18.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:18.504000 audit[5074]: USER_ACCT pid=5074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.505569 sshd[5074]: Accepted publickey for core from 10.0.0.1 port 35198 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:18.504000 audit[5074]: CRED_ACQ pid=5074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.504000 audit[5074]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcec521750 a2=3 a3=0 items=0 ppid=1 pid=5074 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:18.504000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:18.506448 sshd[5074]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:18.509894 systemd-logind[1191]: New session 21 of user core. May 15 00:48:18.510615 systemd[1]: Started session-21.scope. May 15 00:48:18.513000 audit[5074]: USER_START pid=5074 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.514000 audit[5079]: CRED_ACQ pid=5079 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.761523 sshd[5074]: pam_unix(sshd:session): session closed for user core May 15 00:48:18.761000 audit[5074]: USER_END pid=5074 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.761000 audit[5074]: CRED_DISP pid=5074 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.763701 systemd[1]: sshd@20-10.0.0.19:22-10.0.0.1:35198.service: Deactivated successfully. May 15 00:48:18.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.19:22-10.0.0.1:35198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:18.764207 systemd[1]: session-21.scope: Deactivated successfully. May 15 00:48:18.764727 systemd-logind[1191]: Session 21 logged out. Waiting for processes to exit. May 15 00:48:18.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.19:22-10.0.0.1:35202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:18.766006 systemd[1]: Started sshd@21-10.0.0.19:22-10.0.0.1:35202.service. May 15 00:48:18.768115 systemd-logind[1191]: Removed session 21. May 15 00:48:18.794000 audit[5089]: USER_ACCT pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.795944 sshd[5089]: Accepted publickey for core from 10.0.0.1 port 35202 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:18.795000 audit[5089]: CRED_ACQ pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.795000 audit[5089]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd01c4f4e0 a2=3 a3=0 items=0 ppid=1 pid=5089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:18.795000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:18.796786 sshd[5089]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:18.800094 systemd-logind[1191]: New session 22 of user core. May 15 00:48:18.800886 systemd[1]: Started session-22.scope. May 15 00:48:18.803000 audit[5089]: USER_START pid=5089 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.804000 audit[5091]: CRED_ACQ pid=5091 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.904094 sshd[5089]: pam_unix(sshd:session): session closed for user core May 15 00:48:18.904000 audit[5089]: USER_END pid=5089 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.904000 audit[5089]: CRED_DISP pid=5089 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:18.906980 systemd[1]: sshd@21-10.0.0.19:22-10.0.0.1:35202.service: Deactivated successfully. May 15 00:48:18.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.19:22-10.0.0.1:35202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:18.907762 systemd[1]: session-22.scope: Deactivated successfully. May 15 00:48:18.908499 systemd-logind[1191]: Session 22 logged out. Waiting for processes to exit. May 15 00:48:18.909221 systemd-logind[1191]: Removed session 22. May 15 00:48:23.908831 systemd[1]: Started sshd@22-10.0.0.19:22-10.0.0.1:35214.service. May 15 00:48:23.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.19:22-10.0.0.1:35214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:23.910033 kernel: kauditd_printk_skb: 69 callbacks suppressed May 15 00:48:23.910095 kernel: audit: type=1130 audit(1747270103.907:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.19:22-10.0.0.1:35214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:23.937000 audit[5104]: USER_ACCT pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:23.938879 sshd[5104]: Accepted publickey for core from 10.0.0.1 port 35214 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:23.943269 kernel: audit: type=1101 audit(1747270103.937:1473): pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:23.943389 kernel: audit: type=1103 audit(1747270103.941:1474): pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:23.941000 audit[5104]: CRED_ACQ pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:23.943606 sshd[5104]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:23.947010 systemd-logind[1191]: New session 23 of user core. May 15 00:48:23.950133 kernel: audit: type=1006 audit(1747270103.942:1475): pid=5104 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 00:48:23.947724 systemd[1]: Started session-23.scope. May 15 00:48:23.942000 audit[5104]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc43964800 a2=3 a3=0 items=0 ppid=1 pid=5104 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:23.942000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:23.956545 kernel: audit: type=1300 audit(1747270103.942:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc43964800 a2=3 a3=0 items=0 ppid=1 pid=5104 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:23.956581 kernel: audit: type=1327 audit(1747270103.942:1475): proctitle=737368643A20636F7265205B707269765D May 15 00:48:23.956597 kernel: audit: type=1105 audit(1747270103.950:1476): pid=5104 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:23.950000 audit[5104]: USER_START pid=5104 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:23.961329 kernel: audit: type=1103 audit(1747270103.951:1477): pid=5106 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:23.951000 audit[5106]: CRED_ACQ pid=5106 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:24.053333 sshd[5104]: pam_unix(sshd:session): session closed for user core May 15 00:48:24.052000 audit[5104]: USER_END pid=5104 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:24.055992 systemd[1]: sshd@22-10.0.0.19:22-10.0.0.1:35214.service: Deactivated successfully. May 15 00:48:24.056680 systemd[1]: session-23.scope: Deactivated successfully. May 15 00:48:24.053000 audit[5104]: CRED_DISP pid=5104 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:24.058960 systemd-logind[1191]: Session 23 logged out. Waiting for processes to exit. May 15 00:48:24.059606 systemd-logind[1191]: Removed session 23. May 15 00:48:24.062006 kernel: audit: type=1106 audit(1747270104.052:1478): pid=5104 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:24.062061 kernel: audit: type=1104 audit(1747270104.053:1479): pid=5104 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:24.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.19:22-10.0.0.1:35214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:24.364000 audit[5118]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:24.364000 audit[5118]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd2158b6b0 a2=0 a3=7ffd2158b69c items=0 ppid=2247 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:24.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:24.369000 audit[5118]: NETFILTER_CFG table=nat:120 family=2 entries=106 op=nft_register_chain pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:24.369000 audit[5118]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd2158b6b0 a2=0 a3=7ffd2158b69c items=0 ppid=2247 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:24.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:26.643126 kubelet[2048]: I0515 00:48:26.643074 2048 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 00:48:26.670000 audit[5124]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=5124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:26.670000 audit[5124]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffce7e970d0 a2=0 a3=7ffce7e970bc items=0 ppid=2247 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:26.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:26.676000 audit[5124]: NETFILTER_CFG table=nat:122 family=2 entries=58 op=nft_register_chain pid=5124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 00:48:26.676000 audit[5124]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffce7e970d0 a2=0 a3=7ffce7e970bc items=0 ppid=2247 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:26.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 00:48:29.057172 systemd[1]: Started sshd@23-10.0.0.19:22-10.0.0.1:48924.service. May 15 00:48:29.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.19:22-10.0.0.1:48924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:29.061458 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 00:48:29.061515 kernel: audit: type=1130 audit(1747270109.056:1485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.19:22-10.0.0.1:48924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:29.083000 audit[5127]: USER_ACCT pid=5127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.085123 sshd[5127]: Accepted publickey for core from 10.0.0.1 port 48924 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:29.086848 sshd[5127]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:29.085000 audit[5127]: CRED_ACQ pid=5127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.090136 systemd-logind[1191]: New session 24 of user core. May 15 00:48:29.093603 kernel: audit: type=1101 audit(1747270109.083:1486): pid=5127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.093680 kernel: audit: type=1103 audit(1747270109.085:1487): pid=5127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.093742 kernel: audit: type=1006 audit(1747270109.085:1488): pid=5127 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 00:48:29.090916 systemd[1]: Started session-24.scope. May 15 00:48:29.095591 kernel: audit: type=1300 audit(1747270109.085:1488): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdff81740 a2=3 a3=0 items=0 ppid=1 pid=5127 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:29.085000 audit[5127]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdff81740 a2=3 a3=0 items=0 ppid=1 pid=5127 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:29.085000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:29.100906 kernel: audit: type=1327 audit(1747270109.085:1488): proctitle=737368643A20636F7265205B707269765D May 15 00:48:29.100939 kernel: audit: type=1105 audit(1747270109.094:1489): pid=5127 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.094000 audit[5127]: USER_START pid=5127 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.095000 audit[5129]: CRED_ACQ pid=5129 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.108522 kernel: audit: type=1103 audit(1747270109.095:1490): pid=5129 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.186901 sshd[5127]: pam_unix(sshd:session): session closed for user core May 15 00:48:29.186000 audit[5127]: USER_END pid=5127 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.188890 systemd[1]: sshd@23-10.0.0.19:22-10.0.0.1:48924.service: Deactivated successfully. May 15 00:48:29.189574 systemd[1]: session-24.scope: Deactivated successfully. May 15 00:48:29.186000 audit[5127]: CRED_DISP pid=5127 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.196371 kernel: audit: type=1106 audit(1747270109.186:1491): pid=5127 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.196424 kernel: audit: type=1104 audit(1747270109.186:1492): pid=5127 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:29.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.19:22-10.0.0.1:48924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:29.197009 systemd-logind[1191]: Session 24 logged out. Waiting for processes to exit. May 15 00:48:29.197629 systemd-logind[1191]: Removed session 24. May 15 00:48:34.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.19:22-10.0.0.1:48932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:34.192021 systemd[1]: Started sshd@24-10.0.0.19:22-10.0.0.1:48932.service. May 15 00:48:34.194036 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:48:34.194164 kernel: audit: type=1130 audit(1747270114.190:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.19:22-10.0.0.1:48932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:34.223000 audit[5141]: USER_ACCT pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.225000 sshd[5141]: Accepted publickey for core from 10.0.0.1 port 48932 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:34.226836 sshd[5141]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:34.225000 audit[5141]: CRED_ACQ pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.233831 systemd[1]: Started session-25.scope. May 15 00:48:34.234028 kernel: audit: type=1101 audit(1747270114.223:1495): pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.234065 kernel: audit: type=1103 audit(1747270114.225:1496): pid=5141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.234083 kernel: audit: type=1006 audit(1747270114.225:1497): pid=5141 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 15 00:48:34.234993 systemd-logind[1191]: New session 25 of user core. May 15 00:48:34.225000 audit[5141]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3273e370 a2=3 a3=0 items=0 ppid=1 pid=5141 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:34.242210 kernel: audit: type=1300 audit(1747270114.225:1497): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3273e370 a2=3 a3=0 items=0 ppid=1 pid=5141 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:34.225000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:34.238000 audit[5141]: USER_START pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.248652 kernel: audit: type=1327 audit(1747270114.225:1497): proctitle=737368643A20636F7265205B707269765D May 15 00:48:34.248688 kernel: audit: type=1105 audit(1747270114.238:1498): pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.248704 kernel: audit: type=1103 audit(1747270114.240:1499): pid=5143 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.240000 audit[5143]: CRED_ACQ pid=5143 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.337355 sshd[5141]: pam_unix(sshd:session): session closed for user core May 15 00:48:34.338000 audit[5141]: USER_END pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.341279 systemd[1]: sshd@24-10.0.0.19:22-10.0.0.1:48932.service: Deactivated successfully. May 15 00:48:34.342049 systemd[1]: session-25.scope: Deactivated successfully. May 15 00:48:34.343139 systemd-logind[1191]: Session 25 logged out. Waiting for processes to exit. May 15 00:48:34.343845 systemd-logind[1191]: Removed session 25. May 15 00:48:34.338000 audit[5141]: CRED_DISP pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.349137 kernel: audit: type=1106 audit(1747270114.338:1500): pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.349202 kernel: audit: type=1104 audit(1747270114.338:1501): pid=5141 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:34.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.19:22-10.0.0.1:48932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:38.392105 kubelet[2048]: E0515 00:48:38.392050 2048 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 00:48:39.342388 systemd[1]: Started sshd@25-10.0.0.19:22-10.0.0.1:34940.service. May 15 00:48:39.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.19:22-10.0.0.1:34940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:39.343617 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 00:48:39.343851 kernel: audit: type=1130 audit(1747270119.342:1503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.19:22-10.0.0.1:34940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 00:48:39.383000 audit[5181]: USER_ACCT pid=5181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.383969 sshd[5181]: Accepted publickey for core from 10.0.0.1 port 34940 ssh2: RSA SHA256:Iwoz1L9/QgXQ9OpXvCPQYapJE0cmIk+lKxZdEnPdReQ May 15 00:48:39.385898 sshd[5181]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 00:48:39.385000 audit[5181]: CRED_ACQ pid=5181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.389374 systemd-logind[1191]: New session 26 of user core. May 15 00:48:39.390232 systemd[1]: Started session-26.scope. May 15 00:48:39.392226 kernel: audit: type=1101 audit(1747270119.383:1504): pid=5181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.392306 kernel: audit: type=1103 audit(1747270119.385:1505): pid=5181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.392326 kernel: audit: type=1006 audit(1747270119.385:1506): pid=5181 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 15 00:48:39.385000 audit[5181]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc752c530 a2=3 a3=0 items=0 ppid=1 pid=5181 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:39.398957 kernel: audit: type=1300 audit(1747270119.385:1506): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc752c530 a2=3 a3=0 items=0 ppid=1 pid=5181 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 00:48:39.399013 kernel: audit: type=1327 audit(1747270119.385:1506): proctitle=737368643A20636F7265205B707269765D May 15 00:48:39.385000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 00:48:39.400431 kernel: audit: type=1105 audit(1747270119.394:1507): pid=5181 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.394000 audit[5181]: USER_START pid=5181 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.404789 kernel: audit: type=1103 audit(1747270119.396:1508): pid=5183 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.396000 audit[5183]: CRED_ACQ pid=5183 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.501461 sshd[5181]: pam_unix(sshd:session): session closed for user core May 15 00:48:39.502000 audit[5181]: USER_END pid=5181 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.504082 systemd[1]: sshd@25-10.0.0.19:22-10.0.0.1:34940.service: Deactivated successfully. May 15 00:48:39.505030 systemd[1]: session-26.scope: Deactivated successfully. May 15 00:48:39.502000 audit[5181]: CRED_DISP pid=5181 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.507703 systemd-logind[1191]: Session 26 logged out. Waiting for processes to exit. May 15 00:48:39.508546 systemd-logind[1191]: Removed session 26. May 15 00:48:39.510231 kernel: audit: type=1106 audit(1747270119.502:1509): pid=5181 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.510300 kernel: audit: type=1104 audit(1747270119.502:1510): pid=5181 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 00:48:39.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.19:22-10.0.0.1:34940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'