May 8 00:47:00.180369 kernel: Linux version 5.15.180-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 7 23:10:51 -00 2025 May 8 00:47:00.180399 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:47:00.180408 kernel: BIOS-provided physical RAM map: May 8 00:47:00.180414 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 8 00:47:00.180419 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 8 00:47:00.180425 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 8 00:47:00.180432 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 8 00:47:00.180438 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 8 00:47:00.180445 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 8 00:47:00.180451 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 8 00:47:00.180456 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 8 00:47:00.180472 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 8 00:47:00.180477 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 8 00:47:00.180483 kernel: NX (Execute Disable) protection: active May 8 00:47:00.180492 kernel: SMBIOS 2.8 present. May 8 00:47:00.180498 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 8 00:47:00.180505 kernel: Hypervisor detected: KVM May 8 00:47:00.180511 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 8 00:47:00.180517 kernel: kvm-clock: cpu 0, msr 59198001, primary cpu clock May 8 00:47:00.180523 kernel: kvm-clock: using sched offset of 3990862538 cycles May 8 00:47:00.180530 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 8 00:47:00.180536 kernel: tsc: Detected 2794.748 MHz processor May 8 00:47:00.180542 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 8 00:47:00.180550 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 8 00:47:00.180557 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 8 00:47:00.180578 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 8 00:47:00.180587 kernel: Using GB pages for direct mapping May 8 00:47:00.180594 kernel: ACPI: Early table checksum verification disabled May 8 00:47:00.180601 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 8 00:47:00.180607 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:47:00.180617 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:47:00.180631 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:47:00.180654 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 8 00:47:00.180671 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:47:00.180688 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:47:00.180702 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:47:00.180708 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:47:00.180714 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 8 00:47:00.180721 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 8 00:47:00.180727 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 8 00:47:00.180738 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 8 00:47:00.180745 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 8 00:47:00.180752 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 8 00:47:00.180758 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 8 00:47:00.180765 kernel: No NUMA configuration found May 8 00:47:00.180772 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 8 00:47:00.180780 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 8 00:47:00.180786 kernel: Zone ranges: May 8 00:47:00.180793 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 8 00:47:00.180799 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 8 00:47:00.180806 kernel: Normal empty May 8 00:47:00.180812 kernel: Movable zone start for each node May 8 00:47:00.180819 kernel: Early memory node ranges May 8 00:47:00.180826 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 8 00:47:00.180832 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 8 00:47:00.180840 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 8 00:47:00.180849 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 8 00:47:00.180856 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 8 00:47:00.180863 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 8 00:47:00.180869 kernel: ACPI: PM-Timer IO Port: 0x608 May 8 00:47:00.180879 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 8 00:47:00.180888 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 8 00:47:00.180895 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 8 00:47:00.180909 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 8 00:47:00.180916 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 8 00:47:00.180925 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 8 00:47:00.180932 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 8 00:47:00.180938 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 8 00:47:00.180945 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 8 00:47:00.180951 kernel: TSC deadline timer available May 8 00:47:00.180958 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 8 00:47:00.180965 kernel: kvm-guest: KVM setup pv remote TLB flush May 8 00:47:00.180971 kernel: kvm-guest: setup PV sched yield May 8 00:47:00.180978 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 8 00:47:00.180986 kernel: Booting paravirtualized kernel on KVM May 8 00:47:00.180993 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 8 00:47:00.181002 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 8 00:47:00.181009 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 8 00:47:00.181023 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 8 00:47:00.181030 kernel: pcpu-alloc: [0] 0 1 2 3 May 8 00:47:00.181036 kernel: kvm-guest: setup async PF for cpu 0 May 8 00:47:00.181043 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 8 00:47:00.181050 kernel: kvm-guest: PV spinlocks enabled May 8 00:47:00.181070 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 8 00:47:00.181081 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 8 00:47:00.181093 kernel: Policy zone: DMA32 May 8 00:47:00.181103 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:47:00.181110 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 8 00:47:00.181117 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 8 00:47:00.181124 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 8 00:47:00.181130 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 8 00:47:00.181140 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2279K rwdata, 13724K rodata, 47464K init, 4116K bss, 134796K reserved, 0K cma-reserved) May 8 00:47:00.181146 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 8 00:47:00.181161 kernel: ftrace: allocating 34584 entries in 136 pages May 8 00:47:00.181171 kernel: ftrace: allocated 136 pages with 2 groups May 8 00:47:00.181178 kernel: rcu: Hierarchical RCU implementation. May 8 00:47:00.181185 kernel: rcu: RCU event tracing is enabled. May 8 00:47:00.181192 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 8 00:47:00.181199 kernel: Rude variant of Tasks RCU enabled. May 8 00:47:00.181205 kernel: Tracing variant of Tasks RCU enabled. May 8 00:47:00.181214 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 8 00:47:00.181221 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 8 00:47:00.181228 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 8 00:47:00.181235 kernel: random: crng init done May 8 00:47:00.181241 kernel: Console: colour VGA+ 80x25 May 8 00:47:00.181248 kernel: printk: console [ttyS0] enabled May 8 00:47:00.181255 kernel: ACPI: Core revision 20210730 May 8 00:47:00.181261 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 8 00:47:00.181268 kernel: APIC: Switch to symmetric I/O mode setup May 8 00:47:00.181276 kernel: x2apic enabled May 8 00:47:00.181283 kernel: Switched APIC routing to physical x2apic. May 8 00:47:00.181289 kernel: kvm-guest: setup PV IPIs May 8 00:47:00.181304 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 8 00:47:00.181322 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 8 00:47:00.181338 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 8 00:47:00.181344 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 8 00:47:00.181351 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 8 00:47:00.181358 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 8 00:47:00.181372 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 8 00:47:00.181386 kernel: Spectre V2 : Mitigation: Retpolines May 8 00:47:00.181403 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch May 8 00:47:00.181421 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT May 8 00:47:00.181428 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 8 00:47:00.181437 kernel: RETBleed: Mitigation: untrained return thunk May 8 00:47:00.181445 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 8 00:47:00.181452 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 8 00:47:00.181470 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 8 00:47:00.181478 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 8 00:47:00.181493 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 8 00:47:00.181507 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 8 00:47:00.181515 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 8 00:47:00.181522 kernel: Freeing SMP alternatives memory: 32K May 8 00:47:00.181529 kernel: pid_max: default: 32768 minimum: 301 May 8 00:47:00.181536 kernel: LSM: Security Framework initializing May 8 00:47:00.181545 kernel: SELinux: Initializing. May 8 00:47:00.181552 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:47:00.181567 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:47:00.181593 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 8 00:47:00.181608 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 8 00:47:00.181615 kernel: ... version: 0 May 8 00:47:00.181622 kernel: ... bit width: 48 May 8 00:47:00.181629 kernel: ... generic registers: 6 May 8 00:47:00.181636 kernel: ... value mask: 0000ffffffffffff May 8 00:47:00.181646 kernel: ... max period: 00007fffffffffff May 8 00:47:00.181653 kernel: ... fixed-purpose events: 0 May 8 00:47:00.181660 kernel: ... event mask: 000000000000003f May 8 00:47:00.181667 kernel: signal: max sigframe size: 1776 May 8 00:47:00.181674 kernel: rcu: Hierarchical SRCU implementation. May 8 00:47:00.181681 kernel: smp: Bringing up secondary CPUs ... May 8 00:47:00.181688 kernel: x86: Booting SMP configuration: May 8 00:47:00.181694 kernel: .... node #0, CPUs: #1 May 8 00:47:00.181701 kernel: kvm-clock: cpu 1, msr 59198041, secondary cpu clock May 8 00:47:00.181708 kernel: kvm-guest: setup async PF for cpu 1 May 8 00:47:00.181717 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 8 00:47:00.181723 kernel: #2 May 8 00:47:00.181731 kernel: kvm-clock: cpu 2, msr 59198081, secondary cpu clock May 8 00:47:00.181738 kernel: kvm-guest: setup async PF for cpu 2 May 8 00:47:00.181745 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 8 00:47:00.181752 kernel: #3 May 8 00:47:00.181758 kernel: kvm-clock: cpu 3, msr 591980c1, secondary cpu clock May 8 00:47:00.181765 kernel: kvm-guest: setup async PF for cpu 3 May 8 00:47:00.181772 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 8 00:47:00.181783 kernel: smp: Brought up 1 node, 4 CPUs May 8 00:47:00.181798 kernel: smpboot: Max logical packages: 1 May 8 00:47:00.181805 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 8 00:47:00.181820 kernel: devtmpfs: initialized May 8 00:47:00.181834 kernel: x86/mm: Memory block size: 128MB May 8 00:47:00.181841 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 8 00:47:00.181848 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 8 00:47:00.181856 kernel: pinctrl core: initialized pinctrl subsystem May 8 00:47:00.181863 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 8 00:47:00.181872 kernel: audit: initializing netlink subsys (disabled) May 8 00:47:00.181879 kernel: audit: type=2000 audit(1746665219.833:1): state=initialized audit_enabled=0 res=1 May 8 00:47:00.181886 kernel: thermal_sys: Registered thermal governor 'step_wise' May 8 00:47:00.181893 kernel: thermal_sys: Registered thermal governor 'user_space' May 8 00:47:00.181900 kernel: cpuidle: using governor menu May 8 00:47:00.181907 kernel: ACPI: bus type PCI registered May 8 00:47:00.181914 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 8 00:47:00.181921 kernel: dca service started, version 1.12.1 May 8 00:47:00.181928 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 8 00:47:00.181936 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 8 00:47:00.181943 kernel: PCI: Using configuration type 1 for base access May 8 00:47:00.181951 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 8 00:47:00.181958 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 8 00:47:00.181965 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 8 00:47:00.181972 kernel: ACPI: Added _OSI(Module Device) May 8 00:47:00.181979 kernel: ACPI: Added _OSI(Processor Device) May 8 00:47:00.181986 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 8 00:47:00.181993 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 8 00:47:00.182001 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 8 00:47:00.182008 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 8 00:47:00.182015 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 8 00:47:00.182022 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 8 00:47:00.182029 kernel: ACPI: Interpreter enabled May 8 00:47:00.182036 kernel: ACPI: PM: (supports S0 S3 S5) May 8 00:47:00.182047 kernel: ACPI: Using IOAPIC for interrupt routing May 8 00:47:00.182066 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 8 00:47:00.182078 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 8 00:47:00.182088 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 8 00:47:00.182278 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 8 00:47:00.182384 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 8 00:47:00.182474 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 8 00:47:00.182484 kernel: PCI host bridge to bus 0000:00 May 8 00:47:00.182605 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 8 00:47:00.182700 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 8 00:47:00.182797 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 8 00:47:00.182907 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 8 00:47:00.182986 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 8 00:47:00.183087 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 8 00:47:00.183165 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 8 00:47:00.183297 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 8 00:47:00.183400 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 8 00:47:00.183496 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 8 00:47:00.183582 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 8 00:47:00.183659 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 8 00:47:00.183736 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 8 00:47:00.183825 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 8 00:47:00.183907 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 8 00:47:00.183999 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 8 00:47:00.184078 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 8 00:47:00.184169 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 8 00:47:00.184249 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 8 00:47:00.184330 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 8 00:47:00.184409 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 8 00:47:00.184517 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 8 00:47:00.184612 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 8 00:47:00.184690 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 8 00:47:00.184769 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 8 00:47:00.184846 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 8 00:47:00.184949 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 8 00:47:00.185027 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 8 00:47:00.185123 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 8 00:47:00.185210 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 8 00:47:00.185287 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 8 00:47:00.185381 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 8 00:47:00.185472 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 8 00:47:00.185482 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 8 00:47:00.185490 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 8 00:47:00.185497 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 8 00:47:00.185508 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 8 00:47:00.185515 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 8 00:47:00.185522 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 8 00:47:00.185529 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 8 00:47:00.185536 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 8 00:47:00.185544 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 8 00:47:00.185551 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 8 00:47:00.185558 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 8 00:47:00.185565 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 8 00:47:00.185581 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 8 00:47:00.185588 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 8 00:47:00.185595 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 8 00:47:00.185602 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 8 00:47:00.185609 kernel: iommu: Default domain type: Translated May 8 00:47:00.185618 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 8 00:47:00.185700 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 8 00:47:00.185778 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 8 00:47:00.185859 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 8 00:47:00.185869 kernel: vgaarb: loaded May 8 00:47:00.185876 kernel: pps_core: LinuxPPS API ver. 1 registered May 8 00:47:00.185883 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 8 00:47:00.185890 kernel: PTP clock support registered May 8 00:47:00.185897 kernel: PCI: Using ACPI for IRQ routing May 8 00:47:00.185905 kernel: PCI: pci_cache_line_size set to 64 bytes May 8 00:47:00.185912 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 8 00:47:00.185919 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 8 00:47:00.185928 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 8 00:47:00.185936 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 8 00:47:00.185943 kernel: clocksource: Switched to clocksource kvm-clock May 8 00:47:00.185950 kernel: VFS: Disk quotas dquot_6.6.0 May 8 00:47:00.185957 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 8 00:47:00.185964 kernel: pnp: PnP ACPI init May 8 00:47:00.186060 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 8 00:47:00.186070 kernel: pnp: PnP ACPI: found 6 devices May 8 00:47:00.186080 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 8 00:47:00.186087 kernel: NET: Registered PF_INET protocol family May 8 00:47:00.186094 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 8 00:47:00.186102 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 8 00:47:00.186109 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 8 00:47:00.186116 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 8 00:47:00.186123 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 8 00:47:00.186130 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 8 00:47:00.186137 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:47:00.186146 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:47:00.186153 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 8 00:47:00.186160 kernel: NET: Registered PF_XDP protocol family May 8 00:47:00.186232 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 8 00:47:00.186302 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 8 00:47:00.186371 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 8 00:47:00.186440 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 8 00:47:00.186533 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 8 00:47:00.186613 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 8 00:47:00.186625 kernel: PCI: CLS 0 bytes, default 64 May 8 00:47:00.186632 kernel: Initialise system trusted keyrings May 8 00:47:00.186640 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 8 00:47:00.186647 kernel: Key type asymmetric registered May 8 00:47:00.186654 kernel: Asymmetric key parser 'x509' registered May 8 00:47:00.186661 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 8 00:47:00.186668 kernel: io scheduler mq-deadline registered May 8 00:47:00.186675 kernel: io scheduler kyber registered May 8 00:47:00.186682 kernel: io scheduler bfq registered May 8 00:47:00.186691 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 8 00:47:00.186698 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 8 00:47:00.186706 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 8 00:47:00.186713 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 8 00:47:00.186720 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 8 00:47:00.186727 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 8 00:47:00.186734 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 8 00:47:00.186741 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 8 00:47:00.186748 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 8 00:47:00.186840 kernel: rtc_cmos 00:04: RTC can wake from S4 May 8 00:47:00.186851 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 8 00:47:00.186920 kernel: rtc_cmos 00:04: registered as rtc0 May 8 00:47:00.186990 kernel: rtc_cmos 00:04: setting system clock to 2025-05-08T00:46:59 UTC (1746665219) May 8 00:47:00.187062 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 8 00:47:00.187071 kernel: NET: Registered PF_INET6 protocol family May 8 00:47:00.187078 kernel: Segment Routing with IPv6 May 8 00:47:00.187085 kernel: In-situ OAM (IOAM) with IPv6 May 8 00:47:00.187096 kernel: NET: Registered PF_PACKET protocol family May 8 00:47:00.187103 kernel: Key type dns_resolver registered May 8 00:47:00.187110 kernel: IPI shorthand broadcast: enabled May 8 00:47:00.187117 kernel: sched_clock: Marking stable (488183559, 123284730)->(850340034, -238871745) May 8 00:47:00.187124 kernel: registered taskstats version 1 May 8 00:47:00.187131 kernel: Loading compiled-in X.509 certificates May 8 00:47:00.187139 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.180-flatcar: c9ff13353458e6fa2786638fdd3dcad841d1075c' May 8 00:47:00.187146 kernel: Key type .fscrypt registered May 8 00:47:00.187154 kernel: Key type fscrypt-provisioning registered May 8 00:47:00.187164 kernel: ima: No TPM chip found, activating TPM-bypass! May 8 00:47:00.187171 kernel: ima: Allocated hash algorithm: sha1 May 8 00:47:00.187178 kernel: ima: No architecture policies found May 8 00:47:00.187185 kernel: clk: Disabling unused clocks May 8 00:47:00.187192 kernel: Freeing unused kernel image (initmem) memory: 47464K May 8 00:47:00.187199 kernel: Write protecting the kernel read-only data: 28672k May 8 00:47:00.187206 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 8 00:47:00.187213 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 8 00:47:00.187222 kernel: Run /init as init process May 8 00:47:00.187229 kernel: with arguments: May 8 00:47:00.187236 kernel: /init May 8 00:47:00.187242 kernel: with environment: May 8 00:47:00.187249 kernel: HOME=/ May 8 00:47:00.187256 kernel: TERM=linux May 8 00:47:00.187263 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 8 00:47:00.187273 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:47:00.187283 systemd[1]: Detected virtualization kvm. May 8 00:47:00.187291 systemd[1]: Detected architecture x86-64. May 8 00:47:00.187298 systemd[1]: Running in initrd. May 8 00:47:00.187306 systemd[1]: No hostname configured, using default hostname. May 8 00:47:00.187313 systemd[1]: Hostname set to . May 8 00:47:00.187321 systemd[1]: Initializing machine ID from VM UUID. May 8 00:47:00.187328 systemd[1]: Queued start job for default target initrd.target. May 8 00:47:00.187336 systemd[1]: Started systemd-ask-password-console.path. May 8 00:47:00.187343 systemd[1]: Reached target cryptsetup.target. May 8 00:47:00.187352 systemd[1]: Reached target paths.target. May 8 00:47:00.187366 systemd[1]: Reached target slices.target. May 8 00:47:00.187375 systemd[1]: Reached target swap.target. May 8 00:47:00.187383 systemd[1]: Reached target timers.target. May 8 00:47:00.187391 systemd[1]: Listening on iscsid.socket. May 8 00:47:00.187400 systemd[1]: Listening on iscsiuio.socket. May 8 00:47:00.187408 systemd[1]: Listening on systemd-journald-audit.socket. May 8 00:47:00.187415 systemd[1]: Listening on systemd-journald-dev-log.socket. May 8 00:47:00.187423 systemd[1]: Listening on systemd-journald.socket. May 8 00:47:00.187431 systemd[1]: Listening on systemd-networkd.socket. May 8 00:47:00.187439 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:47:00.187447 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:47:00.187456 systemd[1]: Reached target sockets.target. May 8 00:47:00.187475 systemd[1]: Starting kmod-static-nodes.service... May 8 00:47:00.187486 systemd[1]: Finished network-cleanup.service. May 8 00:47:00.187493 systemd[1]: Starting systemd-fsck-usr.service... May 8 00:47:00.187501 systemd[1]: Starting systemd-journald.service... May 8 00:47:00.187509 systemd[1]: Starting systemd-modules-load.service... May 8 00:47:00.187517 systemd[1]: Starting systemd-resolved.service... May 8 00:47:00.187524 systemd[1]: Starting systemd-vconsole-setup.service... May 8 00:47:00.187532 systemd[1]: Finished kmod-static-nodes.service. May 8 00:47:00.187540 systemd[1]: Finished systemd-fsck-usr.service. May 8 00:47:00.187548 kernel: audit: type=1130 audit(1746665220.178:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.187557 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:47:00.187577 systemd-journald[197]: Journal started May 8 00:47:00.187620 systemd-journald[197]: Runtime Journal (/run/log/journal/a706418948234629b54a7fd892d22fae) is 6.0M, max 48.5M, 42.5M free. May 8 00:47:00.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.195835 systemd[1]: Started systemd-journald.service. May 8 00:47:00.195865 kernel: audit: type=1130 audit(1746665220.189:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.195314 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:47:00.240506 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 8 00:47:00.240541 kernel: Bridge firewalling registered May 8 00:47:00.240552 kernel: audit: type=1130 audit(1746665220.235:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.196722 systemd-modules-load[198]: Inserted module 'overlay' May 8 00:47:00.245118 kernel: audit: type=1130 audit(1746665220.239:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.208662 systemd-resolved[199]: Positive Trust Anchors: May 8 00:47:00.250065 kernel: audit: type=1130 audit(1746665220.244:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.208674 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:47:00.208702 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:47:00.211010 systemd-resolved[199]: Defaulting to hostname 'linux'. May 8 00:47:00.230076 systemd-modules-load[198]: Inserted module 'br_netfilter' May 8 00:47:00.236053 systemd[1]: Started systemd-resolved.service. May 8 00:47:00.240172 systemd[1]: Finished systemd-vconsole-setup.service. May 8 00:47:00.244936 systemd[1]: Reached target nss-lookup.target. May 8 00:47:00.250170 systemd[1]: Starting dracut-cmdline-ask.service... May 8 00:47:00.293930 systemd[1]: Finished dracut-cmdline-ask.service. May 8 00:47:00.298171 kernel: audit: type=1130 audit(1746665220.293:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.295430 systemd[1]: Starting dracut-cmdline.service... May 8 00:47:00.305128 dracut-cmdline[215]: dracut-dracut-053 May 8 00:47:00.307210 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:47:00.316505 kernel: SCSI subsystem initialized May 8 00:47:00.328573 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 8 00:47:00.328644 kernel: device-mapper: uevent: version 1.0.3 May 8 00:47:00.328663 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 8 00:47:00.332913 systemd-modules-load[198]: Inserted module 'dm_multipath' May 8 00:47:00.334590 systemd[1]: Finished systemd-modules-load.service. May 8 00:47:00.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.337417 systemd[1]: Starting systemd-sysctl.service... May 8 00:47:00.341633 kernel: audit: type=1130 audit(1746665220.335:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.348790 systemd[1]: Finished systemd-sysctl.service. May 8 00:47:00.353649 kernel: audit: type=1130 audit(1746665220.348:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.378513 kernel: Loading iSCSI transport class v2.0-870. May 8 00:47:00.402526 kernel: iscsi: registered transport (tcp) May 8 00:47:00.437694 kernel: iscsi: registered transport (qla4xxx) May 8 00:47:00.437794 kernel: QLogic iSCSI HBA Driver May 8 00:47:00.472378 systemd[1]: Finished dracut-cmdline.service. May 8 00:47:00.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.493080 systemd[1]: Starting dracut-pre-udev.service... May 8 00:47:00.497972 kernel: audit: type=1130 audit(1746665220.491:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.554514 kernel: raid6: avx2x4 gen() 24493 MB/s May 8 00:47:00.571485 kernel: raid6: avx2x4 xor() 7617 MB/s May 8 00:47:00.588495 kernel: raid6: avx2x2 gen() 30814 MB/s May 8 00:47:00.605539 kernel: raid6: avx2x2 xor() 18487 MB/s May 8 00:47:00.622516 kernel: raid6: avx2x1 gen() 22441 MB/s May 8 00:47:00.639516 kernel: raid6: avx2x1 xor() 12936 MB/s May 8 00:47:00.656528 kernel: raid6: sse2x4 gen() 11062 MB/s May 8 00:47:00.673534 kernel: raid6: sse2x4 xor() 6144 MB/s May 8 00:47:00.690527 kernel: raid6: sse2x2 gen() 14641 MB/s May 8 00:47:00.707520 kernel: raid6: sse2x2 xor() 9383 MB/s May 8 00:47:00.724521 kernel: raid6: sse2x1 gen() 9963 MB/s May 8 00:47:00.742279 kernel: raid6: sse2x1 xor() 7068 MB/s May 8 00:47:00.742377 kernel: raid6: using algorithm avx2x2 gen() 30814 MB/s May 8 00:47:00.742406 kernel: raid6: .... xor() 18487 MB/s, rmw enabled May 8 00:47:00.743136 kernel: raid6: using avx2x2 recovery algorithm May 8 00:47:00.758516 kernel: xor: automatically using best checksumming function avx May 8 00:47:00.875521 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 8 00:47:00.885027 systemd[1]: Finished dracut-pre-udev.service. May 8 00:47:00.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.886000 audit: BPF prog-id=7 op=LOAD May 8 00:47:00.886000 audit: BPF prog-id=8 op=LOAD May 8 00:47:00.887681 systemd[1]: Starting systemd-udevd.service... May 8 00:47:00.906986 systemd-udevd[399]: Using default interface naming scheme 'v252'. May 8 00:47:00.913295 systemd[1]: Started systemd-udevd.service. May 8 00:47:00.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.916081 systemd[1]: Starting dracut-pre-trigger.service... May 8 00:47:00.928681 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation May 8 00:47:00.965853 systemd[1]: Finished dracut-pre-trigger.service. May 8 00:47:00.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:00.967488 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:47:01.028707 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:47:01.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:01.069773 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 8 00:47:01.079039 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 8 00:47:01.079057 kernel: GPT:9289727 != 19775487 May 8 00:47:01.079068 kernel: GPT:Alternate GPT header not at the end of the disk. May 8 00:47:01.079079 kernel: GPT:9289727 != 19775487 May 8 00:47:01.079095 kernel: GPT: Use GNU Parted to correct GPT errors. May 8 00:47:01.079105 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:47:01.079117 kernel: cryptd: max_cpu_qlen set to 1000 May 8 00:47:01.093760 kernel: AVX2 version of gcm_enc/dec engaged. May 8 00:47:01.093814 kernel: AES CTR mode by8 optimization enabled May 8 00:47:01.099491 kernel: libata version 3.00 loaded. May 8 00:47:01.109526 kernel: ahci 0000:00:1f.2: version 3.0 May 8 00:47:01.123220 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 8 00:47:01.123239 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 8 00:47:01.123356 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 8 00:47:01.123484 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (440) May 8 00:47:01.123500 kernel: scsi host0: ahci May 8 00:47:01.123691 kernel: scsi host1: ahci May 8 00:47:01.123796 kernel: scsi host2: ahci May 8 00:47:01.123888 kernel: scsi host3: ahci May 8 00:47:01.123982 kernel: scsi host4: ahci May 8 00:47:01.124077 kernel: scsi host5: ahci May 8 00:47:01.124213 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 8 00:47:01.124224 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 8 00:47:01.124233 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 8 00:47:01.124243 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 8 00:47:01.124252 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 8 00:47:01.124261 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 8 00:47:01.116669 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 8 00:47:01.166692 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 8 00:47:01.166990 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 8 00:47:01.177308 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 8 00:47:01.182384 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:47:01.184687 systemd[1]: Starting disk-uuid.service... May 8 00:47:01.196527 disk-uuid[525]: Primary Header is updated. May 8 00:47:01.196527 disk-uuid[525]: Secondary Entries is updated. May 8 00:47:01.196527 disk-uuid[525]: Secondary Header is updated. May 8 00:47:01.201495 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:47:01.205492 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:47:01.430503 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 8 00:47:01.430601 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 8 00:47:01.431493 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 8 00:47:01.434507 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 8 00:47:01.434559 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 8 00:47:01.435496 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 8 00:47:01.436512 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 8 00:47:01.436548 kernel: ata3.00: applying bridge limits May 8 00:47:01.437907 kernel: ata3.00: configured for UDMA/100 May 8 00:47:01.438500 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 8 00:47:01.472728 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 8 00:47:01.490256 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 8 00:47:01.490288 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 8 00:47:02.212492 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:47:02.212564 disk-uuid[526]: The operation has completed successfully. May 8 00:47:02.239759 systemd[1]: disk-uuid.service: Deactivated successfully. May 8 00:47:02.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.239885 systemd[1]: Finished disk-uuid.service. May 8 00:47:02.255654 systemd[1]: Starting verity-setup.service... May 8 00:47:02.272508 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 8 00:47:02.294792 systemd[1]: Found device dev-mapper-usr.device. May 8 00:47:02.352314 systemd[1]: Mounting sysusr-usr.mount... May 8 00:47:02.355603 systemd[1]: Finished verity-setup.service. May 8 00:47:02.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.416502 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:47:02.417277 systemd[1]: Mounted sysusr-usr.mount. May 8 00:47:02.418422 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 8 00:47:02.419522 systemd[1]: Starting ignition-setup.service... May 8 00:47:02.422676 systemd[1]: Starting parse-ip-for-networkd.service... May 8 00:47:02.429624 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:47:02.429656 kernel: BTRFS info (device vda6): using free space tree May 8 00:47:02.429669 kernel: BTRFS info (device vda6): has skinny extents May 8 00:47:02.438947 systemd[1]: mnt-oem.mount: Deactivated successfully. May 8 00:47:02.492856 systemd[1]: Finished ignition-setup.service. May 8 00:47:02.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.494321 systemd[1]: Starting ignition-fetch-offline.service... May 8 00:47:02.497908 systemd[1]: Finished parse-ip-for-networkd.service. May 8 00:47:02.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.499000 audit: BPF prog-id=9 op=LOAD May 8 00:47:02.500928 systemd[1]: Starting systemd-networkd.service... May 8 00:47:02.527066 systemd-networkd[712]: lo: Link UP May 8 00:47:02.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.527074 systemd-networkd[712]: lo: Gained carrier May 8 00:47:02.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.527535 systemd-networkd[712]: Enumeration completed May 8 00:47:02.527681 systemd[1]: Started systemd-networkd.service. May 8 00:47:02.527978 systemd-networkd[712]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:47:02.556038 iscsid[722]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 8 00:47:02.556038 iscsid[722]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 8 00:47:02.556038 iscsid[722]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 8 00:47:02.556038 iscsid[722]: If using hardware iscsi like qla4xxx this message can be ignored. May 8 00:47:02.556038 iscsid[722]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 8 00:47:02.556038 iscsid[722]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 8 00:47:02.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.529410 systemd[1]: Reached target network.target. May 8 00:47:02.560496 ignition[711]: Ignition 2.14.0 May 8 00:47:02.529807 systemd-networkd[712]: eth0: Link UP May 8 00:47:02.560512 ignition[711]: Stage: fetch-offline May 8 00:47:02.529810 systemd-networkd[712]: eth0: Gained carrier May 8 00:47:02.560599 ignition[711]: no configs at "/usr/lib/ignition/base.d" May 8 00:47:02.531223 systemd[1]: Starting iscsiuio.service... May 8 00:47:02.560609 ignition[711]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:47:02.548920 systemd[1]: Started iscsiuio.service. May 8 00:47:02.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.560711 ignition[711]: parsed url from cmdline: "" May 8 00:47:02.550761 systemd[1]: Starting iscsid.service... May 8 00:47:02.560714 ignition[711]: no config URL provided May 8 00:47:02.556040 systemd[1]: Started iscsid.service. May 8 00:47:02.560719 ignition[711]: reading system config file "/usr/lib/ignition/user.ign" May 8 00:47:02.556564 systemd-networkd[712]: eth0: DHCPv4 address 10.0.0.87/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:47:02.560725 ignition[711]: no config at "/usr/lib/ignition/user.ign" May 8 00:47:02.558335 systemd[1]: Starting dracut-initqueue.service... May 8 00:47:02.560744 ignition[711]: op(1): [started] loading QEMU firmware config module May 8 00:47:02.573836 systemd[1]: Finished dracut-initqueue.service. May 8 00:47:02.560748 ignition[711]: op(1): executing: "modprobe" "qemu_fw_cfg" May 8 00:47:02.620403 systemd[1]: Reached target remote-fs-pre.target. May 8 00:47:02.565406 ignition[711]: op(1): [finished] loading QEMU firmware config module May 8 00:47:02.622280 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:47:02.623347 systemd[1]: Reached target remote-fs.target. May 8 00:47:02.625269 systemd[1]: Starting dracut-pre-mount.service... May 8 00:47:02.632527 systemd[1]: Finished dracut-pre-mount.service. May 8 00:47:02.704199 ignition[711]: parsing config with SHA512: a259016f6e745bb54430b7705dc13a1878e161cbc8ac55afc821e911f2b6553d31dc9d7dccf9eb0ccdcf129d38ba1fc7aba8a4cd19d8709d5f3d300809562274 May 8 00:47:02.710615 unknown[711]: fetched base config from "system" May 8 00:47:02.711066 ignition[711]: fetch-offline: fetch-offline passed May 8 00:47:02.710625 unknown[711]: fetched user config from "qemu" May 8 00:47:02.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.711121 ignition[711]: Ignition finished successfully May 8 00:47:02.712403 systemd[1]: Finished ignition-fetch-offline.service. May 8 00:47:02.714115 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 8 00:47:02.714845 systemd[1]: Starting ignition-kargs.service... May 8 00:47:02.724256 ignition[738]: Ignition 2.14.0 May 8 00:47:02.724266 ignition[738]: Stage: kargs May 8 00:47:02.724374 ignition[738]: no configs at "/usr/lib/ignition/base.d" May 8 00:47:02.724387 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:47:02.727235 systemd[1]: Finished ignition-kargs.service. May 8 00:47:02.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.725698 ignition[738]: kargs: kargs passed May 8 00:47:02.729831 systemd[1]: Starting ignition-disks.service... May 8 00:47:02.725744 ignition[738]: Ignition finished successfully May 8 00:47:02.736830 ignition[744]: Ignition 2.14.0 May 8 00:47:02.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.738596 systemd[1]: Finished ignition-disks.service. May 8 00:47:02.736836 ignition[744]: Stage: disks May 8 00:47:02.794215 systemd[1]: Reached target initrd-root-device.target. May 8 00:47:02.736930 ignition[744]: no configs at "/usr/lib/ignition/base.d" May 8 00:47:02.795704 systemd[1]: Reached target local-fs-pre.target. May 8 00:47:02.736939 ignition[744]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:47:02.796582 systemd[1]: Reached target local-fs.target. May 8 00:47:02.737912 ignition[744]: disks: disks passed May 8 00:47:02.798079 systemd[1]: Reached target sysinit.target. May 8 00:47:02.737956 ignition[744]: Ignition finished successfully May 8 00:47:02.798866 systemd[1]: Reached target basic.target. May 8 00:47:02.800014 systemd[1]: Starting systemd-fsck-root.service... May 8 00:47:02.817455 systemd-fsck[752]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 8 00:47:02.983445 systemd[1]: Finished systemd-fsck-root.service. May 8 00:47:02.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.986885 systemd[1]: Mounting sysroot.mount... May 8 00:47:03.002506 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 8 00:47:03.002722 systemd[1]: Mounted sysroot.mount. May 8 00:47:03.003086 systemd[1]: Reached target initrd-root-fs.target. May 8 00:47:03.005742 systemd[1]: Mounting sysroot-usr.mount... May 8 00:47:03.006933 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 8 00:47:03.006963 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 8 00:47:03.006984 systemd[1]: Reached target ignition-diskful.target. May 8 00:47:03.009125 systemd[1]: Mounted sysroot-usr.mount. May 8 00:47:03.012152 systemd[1]: Starting initrd-setup-root.service... May 8 00:47:03.019615 initrd-setup-root[762]: cut: /sysroot/etc/passwd: No such file or directory May 8 00:47:03.023975 initrd-setup-root[770]: cut: /sysroot/etc/group: No such file or directory May 8 00:47:03.027397 initrd-setup-root[778]: cut: /sysroot/etc/shadow: No such file or directory May 8 00:47:03.030959 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory May 8 00:47:03.060988 systemd[1]: Finished initrd-setup-root.service. May 8 00:47:03.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:03.062994 systemd[1]: Starting ignition-mount.service... May 8 00:47:03.064058 systemd[1]: Starting sysroot-boot.service... May 8 00:47:03.073151 bash[804]: umount: /sysroot/usr/share/oem: not mounted. May 8 00:47:03.080939 systemd[1]: Finished sysroot-boot.service. May 8 00:47:03.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:03.083104 ignition[805]: INFO : Ignition 2.14.0 May 8 00:47:03.083104 ignition[805]: INFO : Stage: mount May 8 00:47:03.085199 ignition[805]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:47:03.085199 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:47:03.085199 ignition[805]: INFO : mount: mount passed May 8 00:47:03.085199 ignition[805]: INFO : Ignition finished successfully May 8 00:47:03.090610 systemd[1]: Finished ignition-mount.service. May 8 00:47:03.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:03.363796 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:47:03.418538 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (813) May 8 00:47:03.418584 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:47:03.420685 kernel: BTRFS info (device vda6): using free space tree May 8 00:47:03.420714 kernel: BTRFS info (device vda6): has skinny extents May 8 00:47:03.425195 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:47:03.427727 systemd[1]: Starting ignition-files.service... May 8 00:47:03.443720 ignition[833]: INFO : Ignition 2.14.0 May 8 00:47:03.443720 ignition[833]: INFO : Stage: files May 8 00:47:03.445435 ignition[833]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:47:03.445435 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:47:03.448274 ignition[833]: DEBUG : files: compiled without relabeling support, skipping May 8 00:47:03.450164 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 8 00:47:03.450164 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 8 00:47:03.453215 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 8 00:47:03.454859 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 8 00:47:03.456864 unknown[833]: wrote ssh authorized keys file for user: core May 8 00:47:03.467783 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 8 00:47:03.467783 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 8 00:47:03.467783 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 8 00:47:03.992402 systemd-networkd[712]: eth0: Gained IPv6LL May 8 00:47:04.016524 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 8 00:47:04.276324 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 8 00:47:04.276324 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 8 00:47:04.299494 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 8 00:47:04.299494 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 8 00:47:04.303482 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 8 00:47:04.305447 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:47:04.307451 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:47:04.309529 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:47:04.370611 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:47:04.372873 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:47:04.372873 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:47:04.372873 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 8 00:47:04.372873 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 8 00:47:04.372873 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 8 00:47:04.372873 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 8 00:47:04.730276 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 8 00:47:05.396479 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 8 00:47:05.396479 ignition[833]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 8 00:47:05.402012 ignition[833]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:47:05.402012 ignition[833]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:47:05.402012 ignition[833]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 8 00:47:05.402012 ignition[833]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 8 00:47:05.402012 ignition[833]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:47:05.402012 ignition[833]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:47:05.402012 ignition[833]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 8 00:47:05.402012 ignition[833]: INFO : files: op(f): [started] setting preset to disabled for "coreos-metadata.service" May 8 00:47:05.402012 ignition[833]: INFO : files: op(f): op(10): [started] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:47:05.496994 ignition[833]: INFO : files: op(f): op(10): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:47:05.498710 ignition[833]: INFO : files: op(f): [finished] setting preset to disabled for "coreos-metadata.service" May 8 00:47:05.498710 ignition[833]: INFO : files: op(11): [started] setting preset to enabled for "prepare-helm.service" May 8 00:47:05.501554 ignition[833]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-helm.service" May 8 00:47:05.502996 ignition[833]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 8 00:47:05.504735 ignition[833]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 8 00:47:05.506421 ignition[833]: INFO : files: files passed May 8 00:47:05.507204 ignition[833]: INFO : Ignition finished successfully May 8 00:47:05.509303 systemd[1]: Finished ignition-files.service. May 8 00:47:05.515408 kernel: kauditd_printk_skb: 24 callbacks suppressed May 8 00:47:05.515478 kernel: audit: type=1130 audit(1746665225.509:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.511705 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 8 00:47:05.515927 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 8 00:47:05.517204 systemd[1]: Starting ignition-quench.service... May 8 00:47:05.520170 systemd[1]: ignition-quench.service: Deactivated successfully. May 8 00:47:05.528994 kernel: audit: type=1130 audit(1746665225.520:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.529024 kernel: audit: type=1131 audit(1746665225.520:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.520258 systemd[1]: Finished ignition-quench.service. May 8 00:47:05.532009 initrd-setup-root-after-ignition[859]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 8 00:47:05.535354 initrd-setup-root-after-ignition[861]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 8 00:47:05.537554 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 8 00:47:05.542970 kernel: audit: type=1130 audit(1746665225.537:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.538301 systemd[1]: Reached target ignition-complete.target. May 8 00:47:05.544724 systemd[1]: Starting initrd-parse-etc.service... May 8 00:47:05.564691 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 8 00:47:05.564826 systemd[1]: Finished initrd-parse-etc.service. May 8 00:47:05.574266 kernel: audit: type=1130 audit(1746665225.566:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.574289 kernel: audit: type=1131 audit(1746665225.566:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.566850 systemd[1]: Reached target initrd-fs.target. May 8 00:47:05.574892 systemd[1]: Reached target initrd.target. May 8 00:47:05.609737 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 8 00:47:05.612222 systemd[1]: Starting dracut-pre-pivot.service... May 8 00:47:05.625087 systemd[1]: Finished dracut-pre-pivot.service. May 8 00:47:05.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.627826 systemd[1]: Starting initrd-cleanup.service... May 8 00:47:05.631311 kernel: audit: type=1130 audit(1746665225.626:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.638059 systemd[1]: Stopped target nss-lookup.target. May 8 00:47:05.638400 systemd[1]: Stopped target remote-cryptsetup.target. May 8 00:47:05.640090 systemd[1]: Stopped target timers.target. May 8 00:47:05.724771 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 8 00:47:05.730406 kernel: audit: type=1131 audit(1746665225.725:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.724896 systemd[1]: Stopped dracut-pre-pivot.service. May 8 00:47:05.726478 systemd[1]: Stopped target initrd.target. May 8 00:47:05.730841 systemd[1]: Stopped target basic.target. May 8 00:47:05.731153 systemd[1]: Stopped target ignition-complete.target. May 8 00:47:05.733517 systemd[1]: Stopped target ignition-diskful.target. May 8 00:47:05.734969 systemd[1]: Stopped target initrd-root-device.target. May 8 00:47:05.736549 systemd[1]: Stopped target remote-fs.target. May 8 00:47:05.738071 systemd[1]: Stopped target remote-fs-pre.target. May 8 00:47:05.739885 systemd[1]: Stopped target sysinit.target. May 8 00:47:05.741328 systemd[1]: Stopped target local-fs.target. May 8 00:47:05.742781 systemd[1]: Stopped target local-fs-pre.target. May 8 00:47:05.744209 systemd[1]: Stopped target swap.target. May 8 00:47:05.750932 kernel: audit: type=1131 audit(1746665225.745:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.745541 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 8 00:47:05.745638 systemd[1]: Stopped dracut-pre-mount.service. May 8 00:47:05.756848 kernel: audit: type=1131 audit(1746665225.751:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.745979 systemd[1]: Stopped target cryptsetup.target. May 8 00:47:05.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.751353 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 8 00:47:05.751445 systemd[1]: Stopped dracut-initqueue.service. May 8 00:47:05.751750 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 8 00:47:05.751837 systemd[1]: Stopped ignition-fetch-offline.service. May 8 00:47:05.757332 systemd[1]: Stopped target paths.target. May 8 00:47:05.757755 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 8 00:47:05.761523 systemd[1]: Stopped systemd-ask-password-console.path. May 8 00:47:05.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.762102 systemd[1]: Stopped target slices.target. May 8 00:47:05.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.839351 systemd[1]: Stopped target sockets.target. May 8 00:47:05.847571 iscsid[722]: iscsid shutting down. May 8 00:47:05.840853 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 8 00:47:05.840947 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 8 00:47:05.842816 systemd[1]: ignition-files.service: Deactivated successfully. May 8 00:47:05.842902 systemd[1]: Stopped ignition-files.service. May 8 00:47:05.845832 systemd[1]: Stopping ignition-mount.service... May 8 00:47:05.847651 systemd[1]: Stopping iscsid.service... May 8 00:47:05.855756 systemd[1]: Stopping sysroot-boot.service... May 8 00:47:05.857649 ignition[874]: INFO : Ignition 2.14.0 May 8 00:47:05.857649 ignition[874]: INFO : Stage: umount May 8 00:47:05.857649 ignition[874]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:47:05.857649 ignition[874]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:47:05.857649 ignition[874]: INFO : umount: umount passed May 8 00:47:05.857649 ignition[874]: INFO : Ignition finished successfully May 8 00:47:05.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.861552 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 8 00:47:05.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.861779 systemd[1]: Stopped systemd-udev-trigger.service. May 8 00:47:05.863651 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 8 00:47:05.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.863779 systemd[1]: Stopped dracut-pre-trigger.service. May 8 00:47:05.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.867275 systemd[1]: iscsid.service: Deactivated successfully. May 8 00:47:05.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.867368 systemd[1]: Stopped iscsid.service. May 8 00:47:05.868736 systemd[1]: ignition-mount.service: Deactivated successfully. May 8 00:47:05.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.868807 systemd[1]: Stopped ignition-mount.service. May 8 00:47:05.871629 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 8 00:47:05.871700 systemd[1]: Finished initrd-cleanup.service. May 8 00:47:05.873744 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 8 00:47:05.874634 systemd[1]: iscsid.socket: Deactivated successfully. May 8 00:47:05.874662 systemd[1]: Closed iscsid.socket. May 8 00:47:05.875739 systemd[1]: ignition-disks.service: Deactivated successfully. May 8 00:47:05.875775 systemd[1]: Stopped ignition-disks.service. May 8 00:47:05.876028 systemd[1]: ignition-kargs.service: Deactivated successfully. May 8 00:47:05.876062 systemd[1]: Stopped ignition-kargs.service. May 8 00:47:05.876245 systemd[1]: ignition-setup.service: Deactivated successfully. May 8 00:47:05.876273 systemd[1]: Stopped ignition-setup.service. May 8 00:47:05.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.876554 systemd[1]: Stopping iscsiuio.service... May 8 00:47:05.880008 systemd[1]: iscsiuio.service: Deactivated successfully. May 8 00:47:05.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.880161 systemd[1]: Stopped iscsiuio.service. May 8 00:47:05.881482 systemd[1]: Stopped target network.target. May 8 00:47:05.883245 systemd[1]: iscsiuio.socket: Deactivated successfully. May 8 00:47:05.883291 systemd[1]: Closed iscsiuio.socket. May 8 00:47:05.885104 systemd[1]: Stopping systemd-networkd.service... May 8 00:47:05.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.905000 audit: BPF prog-id=6 op=UNLOAD May 8 00:47:05.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.886806 systemd[1]: Stopping systemd-resolved.service... May 8 00:47:05.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.892570 systemd-networkd[712]: eth0: DHCPv6 lease lost May 8 00:47:05.908000 audit: BPF prog-id=9 op=UNLOAD May 8 00:47:05.893979 systemd[1]: systemd-networkd.service: Deactivated successfully. May 8 00:47:05.894084 systemd[1]: Stopped systemd-networkd.service. May 8 00:47:05.896979 systemd[1]: systemd-resolved.service: Deactivated successfully. May 8 00:47:05.897085 systemd[1]: Stopped systemd-resolved.service. May 8 00:47:05.899860 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 8 00:47:05.899908 systemd[1]: Closed systemd-networkd.socket. May 8 00:47:05.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:05.902219 systemd[1]: Stopping network-cleanup.service... May 8 00:47:05.903549 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 8 00:47:05.903632 systemd[1]: Stopped parse-ip-for-networkd.service. May 8 00:47:05.905242 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 8 00:47:05.905290 systemd[1]: Stopped systemd-sysctl.service. May 8 00:47:05.907246 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 8 00:47:05.907298 systemd[1]: Stopped systemd-modules-load.service. May 8 00:47:05.909164 systemd[1]: Stopping systemd-udevd.service... May 8 00:47:05.913273 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 8 00:47:05.975946 systemd[1]: network-cleanup.service: Deactivated successfully. May 8 00:47:05.976087 systemd[1]: Stopped network-cleanup.service. May 8 00:47:05.988964 systemd[1]: systemd-udevd.service: Deactivated successfully. May 8 00:47:05.989095 systemd[1]: Stopped systemd-udevd.service. May 8 00:47:06.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:06.067851 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 8 00:47:06.067905 systemd[1]: Closed systemd-udevd-control.socket. May 8 00:47:06.069974 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 8 00:47:06.070019 systemd[1]: Closed systemd-udevd-kernel.socket. May 8 00:47:06.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:06.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:06.071685 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 8 00:47:06.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:06.071729 systemd[1]: Stopped dracut-pre-udev.service. May 8 00:47:06.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:06.073579 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 8 00:47:06.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:06.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:06.073619 systemd[1]: Stopped dracut-cmdline.service. May 8 00:47:06.075108 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 8 00:47:06.075144 systemd[1]: Stopped dracut-cmdline-ask.service. May 8 00:47:06.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:06.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:06.076974 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 8 00:47:06.077853 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 8 00:47:06.077908 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 8 00:47:06.078996 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 8 00:47:06.079036 systemd[1]: Stopped kmod-static-nodes.service. May 8 00:47:06.081973 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 8 00:47:06.082012 systemd[1]: Stopped systemd-vconsole-setup.service. May 8 00:47:06.084704 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 8 00:47:06.085108 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 8 00:47:06.085177 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 8 00:47:06.281809 systemd[1]: sysroot-boot.service: Deactivated successfully. May 8 00:47:06.281944 systemd[1]: Stopped sysroot-boot.service. May 8 00:47:06.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:06.283930 systemd[1]: Reached target initrd-switch-root.target. May 8 00:47:06.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:06.285492 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 8 00:47:06.285540 systemd[1]: Stopped initrd-setup-root.service. May 8 00:47:06.286882 systemd[1]: Starting initrd-switch-root.service... May 8 00:47:06.304272 systemd[1]: Switching root. May 8 00:47:06.325344 systemd-journald[197]: Journal stopped May 8 00:47:10.927017 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). May 8 00:47:10.927079 kernel: SELinux: Class mctp_socket not defined in policy. May 8 00:47:10.927100 kernel: SELinux: Class anon_inode not defined in policy. May 8 00:47:10.927114 kernel: SELinux: the above unknown classes and permissions will be allowed May 8 00:47:10.927127 kernel: SELinux: policy capability network_peer_controls=1 May 8 00:47:10.927146 kernel: SELinux: policy capability open_perms=1 May 8 00:47:10.927165 kernel: SELinux: policy capability extended_socket_class=1 May 8 00:47:10.927179 kernel: SELinux: policy capability always_check_network=0 May 8 00:47:10.927193 kernel: SELinux: policy capability cgroup_seclabel=1 May 8 00:47:10.927210 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 8 00:47:10.927223 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 8 00:47:10.927235 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 8 00:47:10.927249 systemd[1]: Successfully loaded SELinux policy in 56.636ms. May 8 00:47:10.927269 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.378ms. May 8 00:47:10.927303 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:47:10.927319 systemd[1]: Detected virtualization kvm. May 8 00:47:10.927333 systemd[1]: Detected architecture x86-64. May 8 00:47:10.927347 systemd[1]: Detected first boot. May 8 00:47:10.927362 systemd[1]: Initializing machine ID from VM UUID. May 8 00:47:10.927380 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 8 00:47:10.927394 systemd[1]: Populated /etc with preset unit settings. May 8 00:47:10.927409 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:47:10.927433 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:47:10.927449 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:47:10.927483 kernel: kauditd_printk_skb: 48 callbacks suppressed May 8 00:47:10.927499 kernel: audit: type=1334 audit(1746665230.615:86): prog-id=12 op=LOAD May 8 00:47:10.927514 kernel: audit: type=1334 audit(1746665230.615:87): prog-id=3 op=UNLOAD May 8 00:47:10.927533 kernel: audit: type=1334 audit(1746665230.618:88): prog-id=13 op=LOAD May 8 00:47:10.927547 kernel: audit: type=1334 audit(1746665230.620:89): prog-id=14 op=LOAD May 8 00:47:10.927565 kernel: audit: type=1334 audit(1746665230.621:90): prog-id=4 op=UNLOAD May 8 00:47:10.927580 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 8 00:47:10.927594 kernel: audit: type=1334 audit(1746665230.621:91): prog-id=5 op=UNLOAD May 8 00:47:10.927608 kernel: audit: type=1131 audit(1746665230.622:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:10.927622 systemd[1]: Stopped initrd-switch-root.service. May 8 00:47:10.927637 kernel: audit: type=1130 audit(1746665230.632:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:10.927657 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 8 00:47:10.927673 kernel: audit: type=1131 audit(1746665230.632:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:10.927687 systemd[1]: Created slice system-addon\x2dconfig.slice. May 8 00:47:10.927701 systemd[1]: Created slice system-addon\x2drun.slice. May 8 00:47:10.927714 kernel: audit: type=1334 audit(1746665230.644:95): prog-id=12 op=UNLOAD May 8 00:47:10.927729 systemd[1]: Created slice system-getty.slice. May 8 00:47:10.927744 systemd[1]: Created slice system-modprobe.slice. May 8 00:47:10.927765 systemd[1]: Created slice system-serial\x2dgetty.slice. May 8 00:47:10.927779 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 8 00:47:10.927805 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 8 00:47:10.927820 systemd[1]: Created slice user.slice. May 8 00:47:10.927834 systemd[1]: Started systemd-ask-password-console.path. May 8 00:47:10.927847 systemd[1]: Started systemd-ask-password-wall.path. May 8 00:47:10.927862 systemd[1]: Set up automount boot.automount. May 8 00:47:10.927877 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 8 00:47:10.927892 systemd[1]: Stopped target initrd-switch-root.target. May 8 00:47:10.927916 systemd[1]: Stopped target initrd-fs.target. May 8 00:47:10.927931 systemd[1]: Stopped target initrd-root-fs.target. May 8 00:47:10.927945 systemd[1]: Reached target integritysetup.target. May 8 00:47:10.927960 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:47:10.927975 systemd[1]: Reached target remote-fs.target. May 8 00:47:10.927991 systemd[1]: Reached target slices.target. May 8 00:47:10.928006 systemd[1]: Reached target swap.target. May 8 00:47:10.928022 systemd[1]: Reached target torcx.target. May 8 00:47:10.928036 systemd[1]: Reached target veritysetup.target. May 8 00:47:10.928058 systemd[1]: Listening on systemd-coredump.socket. May 8 00:47:10.928073 systemd[1]: Listening on systemd-initctl.socket. May 8 00:47:10.928088 systemd[1]: Listening on systemd-networkd.socket. May 8 00:47:10.928107 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:47:10.928126 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:47:10.928143 systemd[1]: Listening on systemd-userdbd.socket. May 8 00:47:10.928158 systemd[1]: Mounting dev-hugepages.mount... May 8 00:47:10.928173 systemd[1]: Mounting dev-mqueue.mount... May 8 00:47:10.928189 systemd[1]: Mounting media.mount... May 8 00:47:10.928206 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:47:10.928228 systemd[1]: Mounting sys-kernel-debug.mount... May 8 00:47:10.928242 systemd[1]: Mounting sys-kernel-tracing.mount... May 8 00:47:10.928257 systemd[1]: Mounting tmp.mount... May 8 00:47:10.928271 systemd[1]: Starting flatcar-tmpfiles.service... May 8 00:47:10.928296 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:47:10.928313 systemd[1]: Starting kmod-static-nodes.service... May 8 00:47:10.928329 systemd[1]: Starting modprobe@configfs.service... May 8 00:47:10.928344 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:47:10.928378 systemd[1]: Starting modprobe@drm.service... May 8 00:47:10.928402 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:47:10.928417 systemd[1]: Starting modprobe@fuse.service... May 8 00:47:10.928431 systemd[1]: Starting modprobe@loop.service... May 8 00:47:10.928446 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 8 00:47:10.928475 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 8 00:47:10.928491 systemd[1]: Stopped systemd-fsck-root.service. May 8 00:47:10.928505 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 8 00:47:10.928521 systemd[1]: Stopped systemd-fsck-usr.service. May 8 00:47:10.928543 kernel: fuse: init (API version 7.34) May 8 00:47:10.928558 systemd[1]: Stopped systemd-journald.service. May 8 00:47:10.928572 kernel: loop: module loaded May 8 00:47:10.928586 systemd[1]: Starting systemd-journald.service... May 8 00:47:10.928601 systemd[1]: Starting systemd-modules-load.service... May 8 00:47:10.928616 systemd[1]: Starting systemd-network-generator.service... May 8 00:47:10.928632 systemd[1]: Starting systemd-remount-fs.service... May 8 00:47:10.928647 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:47:10.928663 systemd[1]: verity-setup.service: Deactivated successfully. May 8 00:47:10.928679 systemd[1]: Stopped verity-setup.service. May 8 00:47:10.928713 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:47:10.928732 systemd-journald[998]: Journal started May 8 00:47:10.928791 systemd-journald[998]: Runtime Journal (/run/log/journal/a706418948234629b54a7fd892d22fae) is 6.0M, max 48.5M, 42.5M free. May 8 00:47:06.412000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 8 00:47:06.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:47:06.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:47:06.963000 audit: BPF prog-id=10 op=LOAD May 8 00:47:06.963000 audit: BPF prog-id=10 op=UNLOAD May 8 00:47:06.963000 audit: BPF prog-id=11 op=LOAD May 8 00:47:06.963000 audit: BPF prog-id=11 op=UNLOAD May 8 00:47:07.002000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 8 00:47:07.002000 audit[909]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558a4 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:07.002000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:47:07.004000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 8 00:47:07.004000 audit[909]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155979 a2=1ed a3=0 items=2 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:07.004000 audit: CWD cwd="/" May 8 00:47:07.004000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:07.004000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:07.004000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:47:10.615000 audit: BPF prog-id=12 op=LOAD May 8 00:47:10.615000 audit: BPF prog-id=3 op=UNLOAD May 8 00:47:10.618000 audit: BPF prog-id=13 op=LOAD May 8 00:47:10.620000 audit: BPF prog-id=14 op=LOAD May 8 00:47:10.621000 audit: BPF prog-id=4 op=UNLOAD May 8 00:47:10.621000 audit: BPF prog-id=5 op=UNLOAD May 8 00:47:10.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:10.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:10.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:10.644000 audit: BPF prog-id=12 op=UNLOAD May 8 00:47:10.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:10.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:10.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:10.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:10.904000 audit: BPF prog-id=15 op=LOAD May 8 00:47:10.904000 audit: BPF prog-id=16 op=LOAD May 8 00:47:10.904000 audit: BPF prog-id=17 op=LOAD May 8 00:47:10.904000 audit: BPF prog-id=13 op=UNLOAD May 8 00:47:10.904000 audit: BPF prog-id=14 op=UNLOAD May 8 00:47:10.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:10.924000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 8 00:47:10.924000 audit[998]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc978d4ba0 a2=4000 a3=7ffc978d4c3c items=0 ppid=1 pid=998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:10.924000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 8 00:47:10.613661 systemd[1]: Queued start job for default target multi-user.target. May 8 00:47:07.000994 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:47:10.613673 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 8 00:47:07.001278 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:47:10.622392 systemd[1]: systemd-journald.service: Deactivated successfully. May 8 00:47:07.001303 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:47:07.001346 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 8 00:47:07.001359 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=debug msg="skipped missing lower profile" missing profile=oem May 8 00:47:07.001415 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 8 00:47:07.001430 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 8 00:47:07.001654 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 8 00:47:07.001692 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:47:07.001704 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:47:07.002601 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 8 00:47:07.002647 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 8 00:47:07.002670 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 8 00:47:07.002688 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 8 00:47:07.002709 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 8 00:47:07.002724 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:07Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 8 00:47:10.279001 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:10Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:47:10.279279 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:10Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:47:10.279394 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:10Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:47:10.279578 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:10Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:47:10.279625 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:10Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 8 00:47:10.279680 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2025-05-08T00:47:10Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 8 00:47:11.018138 systemd[1]: Started systemd-journald.service. May 8 00:47:11.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.018676 systemd[1]: Mounted dev-hugepages.mount. May 8 00:47:11.019587 systemd[1]: Mounted dev-mqueue.mount. May 8 00:47:11.020377 systemd[1]: Mounted media.mount. May 8 00:47:11.021142 systemd[1]: Mounted sys-kernel-debug.mount. May 8 00:47:11.022012 systemd[1]: Mounted sys-kernel-tracing.mount. May 8 00:47:11.022900 systemd[1]: Mounted tmp.mount. May 8 00:47:11.023793 systemd[1]: Finished flatcar-tmpfiles.service. May 8 00:47:11.024935 systemd[1]: Finished kmod-static-nodes.service. May 8 00:47:11.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.026082 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 8 00:47:11.026195 systemd[1]: Finished modprobe@configfs.service. May 8 00:47:11.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.027362 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:47:11.027484 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:47:11.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.028615 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:47:11.028718 systemd[1]: Finished modprobe@drm.service. May 8 00:47:11.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.030099 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:47:11.030251 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:47:11.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.031532 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 8 00:47:11.031651 systemd[1]: Finished modprobe@fuse.service. May 8 00:47:11.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.032680 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:47:11.032795 systemd[1]: Finished modprobe@loop.service. May 8 00:47:11.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.033853 systemd[1]: Finished systemd-modules-load.service. May 8 00:47:11.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.034966 systemd[1]: Finished systemd-network-generator.service. May 8 00:47:11.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.036127 systemd[1]: Finished systemd-remount-fs.service. May 8 00:47:11.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.037197 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:47:11.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.038653 systemd[1]: Reached target network-pre.target. May 8 00:47:11.040605 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 8 00:47:11.042383 systemd[1]: Mounting sys-kernel-config.mount... May 8 00:47:11.043157 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 8 00:47:11.044800 systemd[1]: Starting systemd-hwdb-update.service... May 8 00:47:11.046655 systemd[1]: Starting systemd-journal-flush.service... May 8 00:47:11.047609 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:47:11.048640 systemd[1]: Starting systemd-random-seed.service... May 8 00:47:11.049693 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:47:11.050431 systemd-journald[998]: Time spent on flushing to /var/log/journal/a706418948234629b54a7fd892d22fae is 13.804ms for 1107 entries. May 8 00:47:11.050431 systemd-journald[998]: System Journal (/var/log/journal/a706418948234629b54a7fd892d22fae) is 8.0M, max 195.6M, 187.6M free. May 8 00:47:11.466317 systemd-journald[998]: Received client request to flush runtime journal. May 8 00:47:11.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.050733 systemd[1]: Starting systemd-sysctl.service... May 8 00:47:11.087711 systemd[1]: Starting systemd-sysusers.service... May 8 00:47:11.089725 systemd[1]: Starting systemd-udev-settle.service... May 8 00:47:11.467159 udevadm[1012]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 8 00:47:11.092935 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 8 00:47:11.094010 systemd[1]: Mounted sys-kernel-config.mount. May 8 00:47:11.178617 systemd[1]: Finished systemd-sysctl.service. May 8 00:47:11.183805 systemd[1]: Finished systemd-sysusers.service. May 8 00:47:11.185957 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:47:11.203112 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:47:11.292372 systemd[1]: Finished systemd-random-seed.service. May 8 00:47:11.293501 systemd[1]: Reached target first-boot-complete.target. May 8 00:47:11.467568 systemd[1]: Finished systemd-journal-flush.service. May 8 00:47:11.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.718140 systemd[1]: Finished systemd-hwdb-update.service. May 8 00:47:11.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.719000 audit: BPF prog-id=18 op=LOAD May 8 00:47:11.719000 audit: BPF prog-id=19 op=LOAD May 8 00:47:11.719000 audit: BPF prog-id=7 op=UNLOAD May 8 00:47:11.719000 audit: BPF prog-id=8 op=UNLOAD May 8 00:47:11.720869 systemd[1]: Starting systemd-udevd.service... May 8 00:47:11.738293 systemd-udevd[1017]: Using default interface naming scheme 'v252'. May 8 00:47:11.756018 systemd[1]: Started systemd-udevd.service. May 8 00:47:11.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.757000 audit: BPF prog-id=20 op=LOAD May 8 00:47:11.759741 systemd[1]: Starting systemd-networkd.service... May 8 00:47:11.766000 audit: BPF prog-id=21 op=LOAD May 8 00:47:11.766000 audit: BPF prog-id=22 op=LOAD May 8 00:47:11.766000 audit: BPF prog-id=23 op=LOAD May 8 00:47:11.767814 systemd[1]: Starting systemd-userdbd.service... May 8 00:47:11.789337 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 8 00:47:11.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.803121 systemd[1]: Started systemd-userdbd.service. May 8 00:47:11.813669 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:47:11.833492 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 8 00:47:11.838486 kernel: ACPI: button: Power Button [PWRF] May 8 00:47:11.854229 systemd-networkd[1025]: lo: Link UP May 8 00:47:11.854238 systemd-networkd[1025]: lo: Gained carrier May 8 00:47:11.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.855075 systemd-networkd[1025]: Enumeration completed May 8 00:47:11.855173 systemd[1]: Started systemd-networkd.service. May 8 00:47:11.856894 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:47:11.858104 systemd-networkd[1025]: eth0: Link UP May 8 00:47:11.858110 systemd-networkd[1025]: eth0: Gained carrier May 8 00:47:11.852000 audit[1027]: AVC avc: denied { confidentiality } for pid=1027 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 8 00:47:11.852000 audit[1027]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55839ce27020 a1=338ac a2=7f120b889bc5 a3=5 items=110 ppid=1017 pid=1027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:11.852000 audit: CWD cwd="/" May 8 00:47:11.852000 audit: PATH item=0 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=1 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=2 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=3 name=(null) inode=12093 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=4 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=5 name=(null) inode=12094 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=6 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=7 name=(null) inode=12095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=8 name=(null) inode=12095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=9 name=(null) inode=12096 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=10 name=(null) inode=12095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=11 name=(null) inode=12097 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=12 name=(null) inode=12095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=13 name=(null) inode=12098 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=14 name=(null) inode=12095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=15 name=(null) inode=12099 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=16 name=(null) inode=12095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=17 name=(null) inode=12100 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=18 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=19 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=20 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=21 name=(null) inode=12102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=22 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=23 name=(null) inode=12103 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=24 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=25 name=(null) inode=12104 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=26 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=27 name=(null) inode=12105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=28 name=(null) inode=12101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=29 name=(null) inode=12106 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=30 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=31 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=32 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=33 name=(null) inode=12108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=34 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=35 name=(null) inode=12109 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=36 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=37 name=(null) inode=12110 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=38 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=39 name=(null) inode=12111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=40 name=(null) inode=12107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=41 name=(null) inode=12112 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=42 name=(null) inode=12092 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.870620 systemd-networkd[1025]: eth0: DHCPv4 address 10.0.0.87/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:47:11.852000 audit: PATH item=43 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=44 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=45 name=(null) inode=12114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=46 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=47 name=(null) inode=12115 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=48 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=49 name=(null) inode=12116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=50 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=51 name=(null) inode=12117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=52 name=(null) inode=12113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=53 name=(null) inode=12118 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=54 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=55 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=56 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=57 name=(null) inode=12120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=58 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=59 name=(null) inode=12121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=60 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=61 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=62 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=63 name=(null) inode=12123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=64 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=65 name=(null) inode=12124 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=66 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=67 name=(null) inode=12125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=68 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=69 name=(null) inode=12126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=70 name=(null) inode=12122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=71 name=(null) inode=12127 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=72 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=73 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=74 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=75 name=(null) inode=12129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=76 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=77 name=(null) inode=12130 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=78 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=79 name=(null) inode=12131 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=80 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=81 name=(null) inode=12132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=82 name=(null) inode=12128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=83 name=(null) inode=12133 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=84 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=85 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=86 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=87 name=(null) inode=12135 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=88 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=89 name=(null) inode=12136 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=90 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=91 name=(null) inode=12137 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=92 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=93 name=(null) inode=12138 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=94 name=(null) inode=12134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=95 name=(null) inode=12139 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=96 name=(null) inode=12119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=97 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=98 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=99 name=(null) inode=12141 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=100 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=101 name=(null) inode=12142 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=102 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=103 name=(null) inode=12143 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=104 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=105 name=(null) inode=12144 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=106 name=(null) inode=12140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=107 name=(null) inode=12145 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PATH item=109 name=(null) inode=12146 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:47:11.852000 audit: PROCTITLE proctitle="(udev-worker)" May 8 00:47:11.885512 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 8 00:47:11.885766 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 8 00:47:11.885886 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 8 00:47:11.885981 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 8 00:47:11.890502 kernel: mousedev: PS/2 mouse device common for all mice May 8 00:47:11.954098 kernel: kvm: Nested Virtualization enabled May 8 00:47:11.954181 kernel: SVM: kvm: Nested Paging enabled May 8 00:47:11.954196 kernel: SVM: Virtual VMLOAD VMSAVE supported May 8 00:47:11.954209 kernel: SVM: Virtual GIF supported May 8 00:47:11.969491 kernel: EDAC MC: Ver: 3.0.0 May 8 00:47:11.996822 systemd[1]: Finished systemd-udev-settle.service. May 8 00:47:11.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:11.998830 systemd[1]: Starting lvm2-activation-early.service... May 8 00:47:12.005379 lvm[1053]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:47:12.030145 systemd[1]: Finished lvm2-activation-early.service. May 8 00:47:12.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.031242 systemd[1]: Reached target cryptsetup.target. May 8 00:47:12.033092 systemd[1]: Starting lvm2-activation.service... May 8 00:47:12.036157 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:47:12.063217 systemd[1]: Finished lvm2-activation.service. May 8 00:47:12.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.064228 systemd[1]: Reached target local-fs-pre.target. May 8 00:47:12.065146 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 8 00:47:12.065169 systemd[1]: Reached target local-fs.target. May 8 00:47:12.066005 systemd[1]: Reached target machines.target. May 8 00:47:12.067877 systemd[1]: Starting ldconfig.service... May 8 00:47:12.068953 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:47:12.069006 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:47:12.070073 systemd[1]: Starting systemd-boot-update.service... May 8 00:47:12.072130 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 8 00:47:12.074386 systemd[1]: Starting systemd-machine-id-commit.service... May 8 00:47:12.076287 systemd[1]: Starting systemd-sysext.service... May 8 00:47:12.077500 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1056 (bootctl) May 8 00:47:12.078411 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 8 00:47:12.085067 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 8 00:47:12.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.091093 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:47:12.094664 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:47:12.094798 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:47:12.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.098909 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 8 00:47:12.099491 systemd[1]: Finished systemd-machine-id-commit.service. May 8 00:47:12.105599 kernel: loop0: detected capacity change from 0 to 210664 May 8 00:47:12.116122 systemd-fsck[1063]: fsck.fat 4.2 (2021-01-31) May 8 00:47:12.116122 systemd-fsck[1063]: /dev/vda1: 790 files, 120710/258078 clusters May 8 00:47:12.116509 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 8 00:47:12.117902 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 8 00:47:12.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.121238 systemd[1]: Mounting boot.mount... May 8 00:47:12.128631 systemd[1]: Mounted boot.mount. May 8 00:47:12.136502 kernel: loop1: detected capacity change from 0 to 210664 May 8 00:47:12.140969 systemd[1]: Finished systemd-boot-update.service. May 8 00:47:12.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.142590 (sd-sysext)[1069]: Using extensions 'kubernetes'. May 8 00:47:12.143020 (sd-sysext)[1069]: Merged extensions into '/usr'. May 8 00:47:12.161399 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:47:12.163264 systemd[1]: Mounting usr-share-oem.mount... May 8 00:47:12.164336 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:47:12.165393 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:47:12.167297 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:47:12.168975 systemd[1]: Starting modprobe@loop.service... May 8 00:47:12.169775 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:47:12.169879 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:47:12.169966 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:47:12.172322 systemd[1]: Mounted usr-share-oem.mount. May 8 00:47:12.173409 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:47:12.173534 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:47:12.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.174755 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:47:12.174852 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:47:12.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.176240 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:47:12.176360 systemd[1]: Finished modprobe@loop.service. May 8 00:47:12.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.177599 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:47:12.177692 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:47:12.178643 systemd[1]: Finished systemd-sysext.service. May 8 00:47:12.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.180704 systemd[1]: Starting ensure-sysext.service... May 8 00:47:12.182275 systemd[1]: Starting systemd-tmpfiles-setup.service... May 8 00:47:12.187428 systemd[1]: Reloading. May 8 00:47:12.193262 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 8 00:47:12.194508 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 8 00:47:12.196154 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 8 00:47:12.221503 ldconfig[1055]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 8 00:47:12.239497 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-08T00:47:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:47:12.239522 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-08T00:47:12Z" level=info msg="torcx already run" May 8 00:47:12.298696 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:47:12.298714 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:47:12.316175 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:47:12.367000 audit: BPF prog-id=24 op=LOAD May 8 00:47:12.368000 audit: BPF prog-id=25 op=LOAD May 8 00:47:12.368000 audit: BPF prog-id=18 op=UNLOAD May 8 00:47:12.368000 audit: BPF prog-id=19 op=UNLOAD May 8 00:47:12.369000 audit: BPF prog-id=26 op=LOAD May 8 00:47:12.369000 audit: BPF prog-id=15 op=UNLOAD May 8 00:47:12.369000 audit: BPF prog-id=27 op=LOAD May 8 00:47:12.369000 audit: BPF prog-id=28 op=LOAD May 8 00:47:12.369000 audit: BPF prog-id=16 op=UNLOAD May 8 00:47:12.369000 audit: BPF prog-id=17 op=UNLOAD May 8 00:47:12.370000 audit: BPF prog-id=29 op=LOAD May 8 00:47:12.371000 audit: BPF prog-id=20 op=UNLOAD May 8 00:47:12.371000 audit: BPF prog-id=30 op=LOAD May 8 00:47:12.371000 audit: BPF prog-id=21 op=UNLOAD May 8 00:47:12.372000 audit: BPF prog-id=31 op=LOAD May 8 00:47:12.372000 audit: BPF prog-id=32 op=LOAD May 8 00:47:12.372000 audit: BPF prog-id=22 op=UNLOAD May 8 00:47:12.372000 audit: BPF prog-id=23 op=UNLOAD May 8 00:47:12.374601 systemd[1]: Finished ldconfig.service. May 8 00:47:12.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.376653 systemd[1]: Finished systemd-tmpfiles-setup.service. May 8 00:47:12.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.380899 systemd[1]: Starting audit-rules.service... May 8 00:47:12.382721 systemd[1]: Starting clean-ca-certificates.service... May 8 00:47:12.384915 systemd[1]: Starting systemd-journal-catalog-update.service... May 8 00:47:12.386000 audit: BPF prog-id=33 op=LOAD May 8 00:47:12.387515 systemd[1]: Starting systemd-resolved.service... May 8 00:47:12.388000 audit: BPF prog-id=34 op=LOAD May 8 00:47:12.390290 systemd[1]: Starting systemd-timesyncd.service... May 8 00:47:12.392288 systemd[1]: Starting systemd-update-utmp.service... May 8 00:47:12.393841 systemd[1]: Finished clean-ca-certificates.service. May 8 00:47:12.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.396917 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:47:12.398000 audit[1150]: SYSTEM_BOOT pid=1150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 8 00:47:12.402752 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:47:12.404278 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:47:12.406380 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:47:12.408228 systemd[1]: Starting modprobe@loop.service... May 8 00:47:12.409084 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:47:12.409335 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:47:12.409582 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:47:12.411020 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:47:12.411147 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:47:12.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.412434 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:47:12.412644 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:47:12.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.414294 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:47:12.414402 systemd[1]: Finished modprobe@loop.service. May 8 00:47:12.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.415897 systemd[1]: Finished systemd-journal-catalog-update.service. May 8 00:47:12.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.417630 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:47:12.417755 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:47:12.418970 systemd[1]: Starting systemd-update-done.service... May 8 00:47:12.420387 systemd[1]: Finished systemd-update-utmp.service. May 8 00:47:12.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.423231 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:47:12.424750 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:47:12.426556 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:47:12.427000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 8 00:47:12.427000 audit[1162]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc64ada5a0 a2=420 a3=0 items=0 ppid=1139 pid=1162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:12.427000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 8 00:47:12.428174 augenrules[1162]: No rules May 8 00:47:12.428454 systemd[1]: Starting modprobe@loop.service... May 8 00:47:12.429321 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:47:12.429431 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:47:12.429578 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:47:12.430436 systemd[1]: Finished audit-rules.service. May 8 00:47:12.431635 systemd[1]: Finished systemd-update-done.service. May 8 00:47:12.432852 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:47:12.432958 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:47:12.434125 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:47:12.434235 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:47:12.435563 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:47:12.435689 systemd[1]: Finished modprobe@loop.service. May 8 00:47:12.437152 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:47:12.437290 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:47:12.440826 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:47:12.442143 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:47:12.444114 systemd[1]: Starting modprobe@drm.service... May 8 00:47:12.445884 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:47:12.447902 systemd[1]: Starting modprobe@loop.service... May 8 00:47:12.448828 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:47:12.448974 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:47:12.450260 systemd[1]: Starting systemd-networkd-wait-online.service... May 8 00:47:12.451341 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:47:13.491495 systemd-timesyncd[1146]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 8 00:47:13.491789 systemd-timesyncd[1146]: Initial clock synchronization to Thu 2025-05-08 00:47:13.491402 UTC. May 8 00:47:13.491965 systemd-resolved[1145]: Positive Trust Anchors: May 8 00:47:13.491981 systemd-resolved[1145]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:47:13.492008 systemd-resolved[1145]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:47:13.492092 systemd[1]: Started systemd-timesyncd.service. May 8 00:47:13.493849 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:47:13.493994 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:47:13.495372 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:47:13.495525 systemd[1]: Finished modprobe@drm.service. May 8 00:47:13.496887 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:47:13.497002 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:47:13.498445 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:47:13.498554 systemd[1]: Finished modprobe@loop.service. May 8 00:47:13.500704 systemd-resolved[1145]: Defaulting to hostname 'linux'. May 8 00:47:13.501100 systemd[1]: Finished ensure-sysext.service. May 8 00:47:13.502786 systemd[1]: Started systemd-resolved.service. May 8 00:47:13.503751 systemd[1]: Reached target network.target. May 8 00:47:13.504590 systemd[1]: Reached target nss-lookup.target. May 8 00:47:13.505412 systemd[1]: Reached target time-set.target. May 8 00:47:13.506309 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:47:13.506331 systemd[1]: Reached target sysinit.target. May 8 00:47:13.507192 systemd[1]: Started motdgen.path. May 8 00:47:13.507921 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 8 00:47:13.509160 systemd[1]: Started logrotate.timer. May 8 00:47:13.509979 systemd[1]: Started mdadm.timer. May 8 00:47:13.510696 systemd[1]: Started systemd-tmpfiles-clean.timer. May 8 00:47:13.511580 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:47:13.511613 systemd[1]: Reached target paths.target. May 8 00:47:13.512435 systemd[1]: Reached target timers.target. May 8 00:47:13.513545 systemd[1]: Listening on dbus.socket. May 8 00:47:13.515226 systemd[1]: Starting docker.socket... May 8 00:47:13.518159 systemd[1]: Listening on sshd.socket. May 8 00:47:13.519036 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:47:13.519078 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:47:13.519409 systemd[1]: Listening on docker.socket. May 8 00:47:13.520242 systemd[1]: Reached target sockets.target. May 8 00:47:13.521196 systemd[1]: Reached target basic.target. May 8 00:47:13.522087 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:47:13.522114 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:47:13.523334 systemd[1]: Starting containerd.service... May 8 00:47:13.525139 systemd[1]: Starting dbus.service... May 8 00:47:13.526871 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:47:13.528881 systemd[1]: Starting extend-filesystems.service... May 8 00:47:13.529976 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 8 00:47:13.530991 systemd[1]: Starting motdgen.service... May 8 00:47:13.532868 systemd[1]: Starting prepare-helm.service... May 8 00:47:13.535829 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:47:13.536532 jq[1182]: false May 8 00:47:13.538023 systemd[1]: Starting sshd-keygen.service... May 8 00:47:13.541347 systemd[1]: Starting systemd-logind.service... May 8 00:47:13.542232 extend-filesystems[1183]: Found loop1 May 8 00:47:13.543641 extend-filesystems[1183]: Found sr0 May 8 00:47:13.543641 extend-filesystems[1183]: Found vda May 8 00:47:13.543641 extend-filesystems[1183]: Found vda1 May 8 00:47:13.543641 extend-filesystems[1183]: Found vda2 May 8 00:47:13.543641 extend-filesystems[1183]: Found vda3 May 8 00:47:13.543641 extend-filesystems[1183]: Found usr May 8 00:47:13.543641 extend-filesystems[1183]: Found vda4 May 8 00:47:13.543641 extend-filesystems[1183]: Found vda6 May 8 00:47:13.543641 extend-filesystems[1183]: Found vda7 May 8 00:47:13.543641 extend-filesystems[1183]: Found vda9 May 8 00:47:13.543641 extend-filesystems[1183]: Checking size of /dev/vda9 May 8 00:47:13.547069 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:47:13.571262 extend-filesystems[1183]: Resized partition /dev/vda9 May 8 00:47:13.548225 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:47:13.550201 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 8 00:47:13.575050 jq[1206]: true May 8 00:47:13.552738 systemd[1]: Starting update-engine.service... May 8 00:47:13.557153 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 8 00:47:13.575510 extend-filesystems[1205]: resize2fs 1.46.5 (30-Dec-2021) May 8 00:47:13.578911 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 8 00:47:13.578974 tar[1208]: linux-amd64/helm May 8 00:47:13.559831 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:47:13.579468 jq[1210]: true May 8 00:47:13.560001 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:47:13.560272 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:47:13.560416 systemd[1]: Finished motdgen.service. May 8 00:47:13.562390 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:47:13.564038 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:47:13.581612 dbus-daemon[1181]: [system] SELinux support is enabled May 8 00:47:13.581894 systemd[1]: Started dbus.service. May 8 00:47:13.584879 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 8 00:47:13.584906 systemd[1]: Reached target system-config.target. May 8 00:47:13.586134 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 8 00:47:13.586148 systemd[1]: Reached target user-config.target. May 8 00:47:13.595931 update_engine[1202]: I0508 00:47:13.595716 1202 main.cc:92] Flatcar Update Engine starting May 8 00:47:13.604112 systemd[1]: Started update-engine.service. May 8 00:47:13.604261 update_engine[1202]: I0508 00:47:13.604210 1202 update_check_scheduler.cc:74] Next update check in 10m19s May 8 00:47:13.607229 systemd[1]: Started locksmithd.service. May 8 00:47:13.622582 env[1211]: time="2025-05-08T00:47:13.622519960Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 8 00:47:13.654618 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 8 00:47:13.654712 env[1211]: time="2025-05-08T00:47:13.641167567Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 8 00:47:13.655240 env[1211]: time="2025-05-08T00:47:13.654885067Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 8 00:47:13.655047 systemd-logind[1192]: Watching system buttons on /dev/input/event1 (Power Button) May 8 00:47:13.655070 systemd-logind[1192]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 8 00:47:13.656520 extend-filesystems[1205]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 8 00:47:13.656520 extend-filesystems[1205]: old_desc_blocks = 1, new_desc_blocks = 1 May 8 00:47:13.656520 extend-filesystems[1205]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 8 00:47:13.666602 extend-filesystems[1183]: Resized filesystem in /dev/vda9 May 8 00:47:13.667671 bash[1232]: Updated "/home/core/.ssh/authorized_keys" May 8 00:47:13.656750 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:47:13.667823 env[1211]: time="2025-05-08T00:47:13.656916057Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.180-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 8 00:47:13.667823 env[1211]: time="2025-05-08T00:47:13.656951483Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 8 00:47:13.667823 env[1211]: time="2025-05-08T00:47:13.657178680Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:47:13.667823 env[1211]: time="2025-05-08T00:47:13.657197645Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 8 00:47:13.667823 env[1211]: time="2025-05-08T00:47:13.657213815Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 8 00:47:13.667823 env[1211]: time="2025-05-08T00:47:13.657226179Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 8 00:47:13.667823 env[1211]: time="2025-05-08T00:47:13.657678878Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 8 00:47:13.667823 env[1211]: time="2025-05-08T00:47:13.657986505Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 8 00:47:13.667823 env[1211]: time="2025-05-08T00:47:13.658165811Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:47:13.667823 env[1211]: time="2025-05-08T00:47:13.658181150Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 8 00:47:13.656901 systemd[1]: Finished extend-filesystems.service. May 8 00:47:13.668092 env[1211]: time="2025-05-08T00:47:13.658228268Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 8 00:47:13.668092 env[1211]: time="2025-05-08T00:47:13.658239419Z" level=info msg="metadata content store policy set" policy=shared May 8 00:47:13.657031 systemd-logind[1192]: New seat seat0. May 8 00:47:13.662974 systemd[1]: Started systemd-logind.service. May 8 00:47:13.668383 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 8 00:47:13.673066 env[1211]: time="2025-05-08T00:47:13.673020494Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 8 00:47:13.673136 env[1211]: time="2025-05-08T00:47:13.673072873Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 8 00:47:13.673136 env[1211]: time="2025-05-08T00:47:13.673088963Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 8 00:47:13.673136 env[1211]: time="2025-05-08T00:47:13.673128998Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 8 00:47:13.673206 env[1211]: time="2025-05-08T00:47:13.673142623Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 8 00:47:13.673206 env[1211]: time="2025-05-08T00:47:13.673155868Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 8 00:47:13.673206 env[1211]: time="2025-05-08T00:47:13.673167169Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 8 00:47:13.673206 env[1211]: time="2025-05-08T00:47:13.673180815Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 8 00:47:13.673206 env[1211]: time="2025-05-08T00:47:13.673196144Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 8 00:47:13.673206 env[1211]: time="2025-05-08T00:47:13.673208367Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 8 00:47:13.673356 env[1211]: time="2025-05-08T00:47:13.673221752Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 8 00:47:13.673356 env[1211]: time="2025-05-08T00:47:13.673233223Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 8 00:47:13.673400 env[1211]: time="2025-05-08T00:47:13.673386731Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 8 00:47:13.673495 env[1211]: time="2025-05-08T00:47:13.673472161Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 8 00:47:13.673772 env[1211]: time="2025-05-08T00:47:13.673746726Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 8 00:47:13.673828 env[1211]: time="2025-05-08T00:47:13.673777154Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 8 00:47:13.673828 env[1211]: time="2025-05-08T00:47:13.673789697Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 8 00:47:13.673883 env[1211]: time="2025-05-08T00:47:13.673853086Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 8 00:47:13.673883 env[1211]: time="2025-05-08T00:47:13.673867463Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 8 00:47:13.673883 env[1211]: time="2025-05-08T00:47:13.673879516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 8 00:47:13.673963 env[1211]: time="2025-05-08T00:47:13.673892500Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 8 00:47:13.673963 env[1211]: time="2025-05-08T00:47:13.673903881Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 8 00:47:13.673963 env[1211]: time="2025-05-08T00:47:13.673914611Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 8 00:47:13.673963 env[1211]: time="2025-05-08T00:47:13.673924841Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 8 00:47:13.673963 env[1211]: time="2025-05-08T00:47:13.673934909Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 8 00:47:13.673963 env[1211]: time="2025-05-08T00:47:13.673946712Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 8 00:47:13.674151 env[1211]: time="2025-05-08T00:47:13.674051849Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 8 00:47:13.674151 env[1211]: time="2025-05-08T00:47:13.674066416Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 8 00:47:13.674151 env[1211]: time="2025-05-08T00:47:13.674078349Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 8 00:47:13.674151 env[1211]: time="2025-05-08T00:47:13.674088988Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 8 00:47:13.674151 env[1211]: time="2025-05-08T00:47:13.674102013Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 8 00:47:13.674151 env[1211]: time="2025-05-08T00:47:13.674112623Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 8 00:47:13.674151 env[1211]: time="2025-05-08T00:47:13.674130867Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 8 00:47:13.674314 env[1211]: time="2025-05-08T00:47:13.674168468Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 8 00:47:13.674450 locksmithd[1233]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 8 00:47:13.674638 env[1211]: time="2025-05-08T00:47:13.674389232Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 8 00:47:13.674638 env[1211]: time="2025-05-08T00:47:13.674465124Z" level=info msg="Connect containerd service" May 8 00:47:13.674638 env[1211]: time="2025-05-08T00:47:13.674509457Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 8 00:47:13.675354 env[1211]: time="2025-05-08T00:47:13.675322332Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:47:13.675599 env[1211]: time="2025-05-08T00:47:13.675575527Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 8 00:47:13.675657 env[1211]: time="2025-05-08T00:47:13.675614289Z" level=info msg=serving... address=/run/containerd/containerd.sock May 8 00:47:13.675753 systemd[1]: Started containerd.service. May 8 00:47:13.677208 env[1211]: time="2025-05-08T00:47:13.677178994Z" level=info msg="containerd successfully booted in 0.055384s" May 8 00:47:13.680348 env[1211]: time="2025-05-08T00:47:13.679831059Z" level=info msg="Start subscribing containerd event" May 8 00:47:13.680790 env[1211]: time="2025-05-08T00:47:13.680743701Z" level=info msg="Start recovering state" May 8 00:47:13.680926 env[1211]: time="2025-05-08T00:47:13.680896628Z" level=info msg="Start event monitor" May 8 00:47:13.680969 env[1211]: time="2025-05-08T00:47:13.680934429Z" level=info msg="Start snapshots syncer" May 8 00:47:13.680969 env[1211]: time="2025-05-08T00:47:13.680952342Z" level=info msg="Start cni network conf syncer for default" May 8 00:47:13.680969 env[1211]: time="2025-05-08T00:47:13.680962391Z" level=info msg="Start streaming server" May 8 00:47:13.837474 systemd[1]: Created slice system-sshd.slice. May 8 00:47:14.118163 sshd_keygen[1200]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 8 00:47:14.134872 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:47:14.134970 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:47:14.137496 systemd[1]: Finished sshd-keygen.service. May 8 00:47:14.140227 systemd[1]: Starting issuegen.service... May 8 00:47:14.142168 systemd[1]: Started sshd@0-10.0.0.87:22-10.0.0.1:39004.service. May 8 00:47:14.147839 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:47:14.147985 systemd[1]: Finished issuegen.service. May 8 00:47:14.150122 systemd[1]: Starting systemd-user-sessions.service... May 8 00:47:14.154299 tar[1208]: linux-amd64/LICENSE May 8 00:47:14.154394 tar[1208]: linux-amd64/README.md May 8 00:47:14.157046 systemd[1]: Finished systemd-user-sessions.service. May 8 00:47:14.159358 systemd[1]: Started getty@tty1.service. May 8 00:47:14.161317 systemd[1]: Started serial-getty@ttyS0.service. May 8 00:47:14.162383 systemd[1]: Reached target getty.target. May 8 00:47:14.163878 systemd[1]: Finished prepare-helm.service. May 8 00:47:14.185578 sshd[1254]: Accepted publickey for core from 10.0.0.1 port 39004 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:14.187101 sshd[1254]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:14.197439 systemd-logind[1192]: New session 1 of user core. May 8 00:47:14.198606 systemd[1]: Created slice user-500.slice. May 8 00:47:14.201009 systemd[1]: Starting user-runtime-dir@500.service... May 8 00:47:14.210702 systemd[1]: Finished user-runtime-dir@500.service. May 8 00:47:14.213228 systemd[1]: Starting user@500.service... May 8 00:47:14.216987 (systemd)[1263]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:14.298857 systemd[1263]: Queued start job for default target default.target. May 8 00:47:14.299503 systemd[1263]: Reached target paths.target. May 8 00:47:14.299531 systemd[1263]: Reached target sockets.target. May 8 00:47:14.299548 systemd[1263]: Reached target timers.target. May 8 00:47:14.299563 systemd[1263]: Reached target basic.target. May 8 00:47:14.299608 systemd[1263]: Reached target default.target. May 8 00:47:14.299637 systemd[1263]: Startup finished in 75ms. May 8 00:47:14.299770 systemd[1]: Started user@500.service. May 8 00:47:14.301846 systemd[1]: Started session-1.scope. May 8 00:47:14.356376 systemd[1]: Started sshd@1-10.0.0.87:22-10.0.0.1:39006.service. May 8 00:47:14.397878 sshd[1272]: Accepted publickey for core from 10.0.0.1 port 39006 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:14.399287 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:14.403907 systemd-logind[1192]: New session 2 of user core. May 8 00:47:14.404947 systemd[1]: Started session-2.scope. May 8 00:47:14.407769 systemd-networkd[1025]: eth0: Gained IPv6LL May 8 00:47:14.409578 systemd[1]: Finished systemd-networkd-wait-online.service. May 8 00:47:14.411108 systemd[1]: Reached target network-online.target. May 8 00:47:14.413878 systemd[1]: Starting kubelet.service... May 8 00:47:14.466794 sshd[1272]: pam_unix(sshd:session): session closed for user core May 8 00:47:14.470839 systemd[1]: Started sshd@2-10.0.0.87:22-10.0.0.1:39016.service. May 8 00:47:14.472595 systemd[1]: sshd@1-10.0.0.87:22-10.0.0.1:39006.service: Deactivated successfully. May 8 00:47:14.473234 systemd[1]: session-2.scope: Deactivated successfully. May 8 00:47:14.474043 systemd-logind[1192]: Session 2 logged out. Waiting for processes to exit. May 8 00:47:14.475307 systemd-logind[1192]: Removed session 2. May 8 00:47:14.506720 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 39016 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:14.507988 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:14.511444 systemd-logind[1192]: New session 3 of user core. May 8 00:47:14.512196 systemd[1]: Started session-3.scope. May 8 00:47:14.567568 sshd[1279]: pam_unix(sshd:session): session closed for user core May 8 00:47:14.570234 systemd[1]: sshd@2-10.0.0.87:22-10.0.0.1:39016.service: Deactivated successfully. May 8 00:47:14.571066 systemd[1]: session-3.scope: Deactivated successfully. May 8 00:47:14.571733 systemd-logind[1192]: Session 3 logged out. Waiting for processes to exit. May 8 00:47:14.572518 systemd-logind[1192]: Removed session 3. May 8 00:47:15.025191 systemd[1]: Started kubelet.service. May 8 00:47:15.026532 systemd[1]: Reached target multi-user.target. May 8 00:47:15.028752 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:47:15.037784 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:47:15.038042 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:47:15.065164 systemd[1]: Startup finished in 975ms (kernel) + 6.356s (initrd) + 7.673s (userspace) = 15.004s. May 8 00:47:15.551833 kubelet[1288]: E0508 00:47:15.551777 1288 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:47:15.553712 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:47:15.553857 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:47:24.573687 systemd[1]: Started sshd@3-10.0.0.87:22-10.0.0.1:37640.service. May 8 00:47:24.611940 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 37640 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:24.613424 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:24.617685 systemd-logind[1192]: New session 4 of user core. May 8 00:47:24.618582 systemd[1]: Started session-4.scope. May 8 00:47:24.675919 sshd[1298]: pam_unix(sshd:session): session closed for user core May 8 00:47:24.679005 systemd[1]: sshd@3-10.0.0.87:22-10.0.0.1:37640.service: Deactivated successfully. May 8 00:47:24.679599 systemd[1]: session-4.scope: Deactivated successfully. May 8 00:47:24.680140 systemd-logind[1192]: Session 4 logged out. Waiting for processes to exit. May 8 00:47:24.681428 systemd[1]: Started sshd@4-10.0.0.87:22-10.0.0.1:37644.service. May 8 00:47:24.682268 systemd-logind[1192]: Removed session 4. May 8 00:47:24.717528 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 37644 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:24.718774 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:24.722790 systemd-logind[1192]: New session 5 of user core. May 8 00:47:24.723609 systemd[1]: Started session-5.scope. May 8 00:47:24.775860 sshd[1304]: pam_unix(sshd:session): session closed for user core May 8 00:47:24.779457 systemd[1]: sshd@4-10.0.0.87:22-10.0.0.1:37644.service: Deactivated successfully. May 8 00:47:24.780199 systemd[1]: session-5.scope: Deactivated successfully. May 8 00:47:24.780833 systemd-logind[1192]: Session 5 logged out. Waiting for processes to exit. May 8 00:47:24.782289 systemd[1]: Started sshd@5-10.0.0.87:22-10.0.0.1:37654.service. May 8 00:47:24.783169 systemd-logind[1192]: Removed session 5. May 8 00:47:24.819236 sshd[1310]: Accepted publickey for core from 10.0.0.1 port 37654 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:24.820486 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:24.823991 systemd-logind[1192]: New session 6 of user core. May 8 00:47:24.825150 systemd[1]: Started session-6.scope. May 8 00:47:24.878926 sshd[1310]: pam_unix(sshd:session): session closed for user core May 8 00:47:24.881697 systemd[1]: sshd@5-10.0.0.87:22-10.0.0.1:37654.service: Deactivated successfully. May 8 00:47:24.882270 systemd[1]: session-6.scope: Deactivated successfully. May 8 00:47:24.882787 systemd-logind[1192]: Session 6 logged out. Waiting for processes to exit. May 8 00:47:24.883967 systemd[1]: Started sshd@6-10.0.0.87:22-10.0.0.1:37658.service. May 8 00:47:24.884811 systemd-logind[1192]: Removed session 6. May 8 00:47:24.918868 sshd[1316]: Accepted publickey for core from 10.0.0.1 port 37658 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:24.920236 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:24.923515 systemd-logind[1192]: New session 7 of user core. May 8 00:47:24.924493 systemd[1]: Started session-7.scope. May 8 00:47:25.804681 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 8 00:47:25.804877 systemd[1]: Stopped kubelet.service. May 8 00:47:25.806395 systemd[1]: Starting kubelet.service... May 8 00:47:25.820961 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 8 00:47:25.821163 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:47:25.829941 dbus-daemon[1181]: \xd0\xed\x86Y\xc5U: received setenforce notice (enforcing=-78354992) May 8 00:47:25.832084 sudo[1319]: pam_unix(sudo:session): session closed for user root May 8 00:47:25.834051 sshd[1316]: pam_unix(sshd:session): session closed for user core May 8 00:47:25.837122 systemd[1]: sshd@6-10.0.0.87:22-10.0.0.1:37658.service: Deactivated successfully. May 8 00:47:25.837658 systemd[1]: session-7.scope: Deactivated successfully. May 8 00:47:25.838324 systemd-logind[1192]: Session 7 logged out. Waiting for processes to exit. May 8 00:47:25.839564 systemd[1]: Started sshd@7-10.0.0.87:22-10.0.0.1:44912.service. May 8 00:47:25.840347 systemd-logind[1192]: Removed session 7. May 8 00:47:25.875103 sshd[1325]: Accepted publickey for core from 10.0.0.1 port 44912 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:25.876393 sshd[1325]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:25.879456 systemd-logind[1192]: New session 8 of user core. May 8 00:47:25.880382 systemd[1]: Started session-8.scope. May 8 00:47:25.932739 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 8 00:47:25.932954 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:47:25.935913 sudo[1329]: pam_unix(sudo:session): session closed for user root May 8 00:47:25.940575 sudo[1328]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 8 00:47:25.940792 sudo[1328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:47:25.948701 systemd[1]: Stopping audit-rules.service... May 8 00:47:25.951698 kernel: kauditd_printk_skb: 212 callbacks suppressed May 8 00:47:25.951778 kernel: audit: type=1305 audit(1746665245.949:191): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:47:25.949000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:47:25.950235 systemd[1]: audit-rules.service: Deactivated successfully. May 8 00:47:25.951930 auditctl[1332]: No rules May 8 00:47:25.950374 systemd[1]: Stopped audit-rules.service. May 8 00:47:25.951885 systemd[1]: Starting audit-rules.service... May 8 00:47:25.949000 audit[1332]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc23c64240 a2=420 a3=0 items=0 ppid=1 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:25.988787 kernel: audit: type=1300 audit(1746665245.949:191): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc23c64240 a2=420 a3=0 items=0 ppid=1 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:25.988845 kernel: audit: type=1327 audit(1746665245.949:191): proctitle=2F7362696E2F617564697463746C002D44 May 8 00:47:25.949000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 8 00:47:25.990037 augenrules[1349]: No rules May 8 00:47:25.990269 kernel: audit: type=1131 audit(1746665245.949:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:25.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:25.990744 systemd[1]: Finished audit-rules.service. May 8 00:47:25.992730 sudo[1328]: pam_unix(sudo:session): session closed for user root May 8 00:47:25.993446 kernel: audit: type=1130 audit(1746665245.990:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:25.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:25.994292 sshd[1325]: pam_unix(sshd:session): session closed for user core May 8 00:47:25.996571 systemd[1]: sshd@7-10.0.0.87:22-10.0.0.1:44912.service: Deactivated successfully. May 8 00:47:25.996915 kernel: audit: type=1106 audit(1746665245.992:194): pid=1328 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:47:25.992000 audit[1328]: USER_END pid=1328 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:47:25.997050 systemd[1]: session-8.scope: Deactivated successfully. May 8 00:47:25.997689 systemd-logind[1192]: Session 8 logged out. Waiting for processes to exit. May 8 00:47:26.001672 kernel: audit: type=1104 audit(1746665245.992:195): pid=1328 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:47:25.992000 audit[1328]: CRED_DISP pid=1328 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:47:25.998480 systemd[1]: Started sshd@8-10.0.0.87:22-10.0.0.1:44916.service. May 8 00:47:25.999632 systemd-logind[1192]: Removed session 8. May 8 00:47:25.994000 audit[1325]: USER_END pid=1325 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:26.009558 kernel: audit: type=1106 audit(1746665245.994:196): pid=1325 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:26.009686 kernel: audit: type=1104 audit(1746665245.994:197): pid=1325 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:25.994000 audit[1325]: CRED_DISP pid=1325 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:25.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.87:22-10.0.0.1:44912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:26.017592 kernel: audit: type=1131 audit(1746665245.996:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.87:22-10.0.0.1:44912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:25.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.87:22-10.0.0.1:44916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:26.036000 audit[1355]: USER_ACCT pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:26.037673 sshd[1355]: Accepted publickey for core from 10.0.0.1 port 44916 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:26.038000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:26.038000 audit[1355]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6a4abb90 a2=3 a3=0 items=0 ppid=1 pid=1355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:26.038000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:47:26.039251 sshd[1355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:26.043815 systemd-logind[1192]: New session 9 of user core. May 8 00:47:26.044577 systemd[1]: Started session-9.scope. May 8 00:47:26.049000 audit[1355]: USER_START pid=1355 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:26.051000 audit[1357]: CRED_ACQ pid=1357 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:26.090471 systemd[1]: Started kubelet.service. May 8 00:47:26.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:26.098000 audit[1361]: USER_ACCT pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:47:26.099000 audit[1361]: CRED_REFR pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:47:26.099723 sudo[1361]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 8 00:47:26.099925 sudo[1361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:47:26.101000 audit[1361]: USER_START pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:47:26.182722 systemd[1]: Starting docker.service... May 8 00:47:26.212697 kubelet[1360]: E0508 00:47:26.211962 1360 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:47:26.216871 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:47:26.217001 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:47:26.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:47:26.252803 env[1379]: time="2025-05-08T00:47:26.252721959Z" level=info msg="Starting up" May 8 00:47:26.254624 env[1379]: time="2025-05-08T00:47:26.254570145Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:47:26.254624 env[1379]: time="2025-05-08T00:47:26.254592587Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:47:26.254624 env[1379]: time="2025-05-08T00:47:26.254620349Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:47:26.254624 env[1379]: time="2025-05-08T00:47:26.254637271Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:47:26.259085 env[1379]: time="2025-05-08T00:47:26.259020853Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:47:26.259085 env[1379]: time="2025-05-08T00:47:26.259056761Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:47:26.259085 env[1379]: time="2025-05-08T00:47:26.259088310Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:47:26.259285 env[1379]: time="2025-05-08T00:47:26.259100593Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:47:26.266125 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3044478855-merged.mount: Deactivated successfully. May 8 00:47:28.424458 env[1379]: time="2025-05-08T00:47:28.424395788Z" level=info msg="Loading containers: start." May 8 00:47:28.521000 audit[1414]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.521000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe360dab80 a2=0 a3=7ffe360dab6c items=0 ppid=1379 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.521000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 8 00:47:28.523000 audit[1416]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.523000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd22bd2740 a2=0 a3=7ffd22bd272c items=0 ppid=1379 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.523000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 8 00:47:28.524000 audit[1418]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.524000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff3b82fb90 a2=0 a3=7fff3b82fb7c items=0 ppid=1379 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.524000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:47:28.526000 audit[1420]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.526000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcc4fc5bc0 a2=0 a3=7ffcc4fc5bac items=0 ppid=1379 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.526000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:47:28.528000 audit[1422]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.528000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd78fac4d0 a2=0 a3=7ffd78fac4bc items=0 ppid=1379 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.528000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 8 00:47:28.546000 audit[1427]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.546000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd27c8d160 a2=0 a3=7ffd27c8d14c items=0 ppid=1379 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.546000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 8 00:47:28.659000 audit[1429]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.659000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc4a9729d0 a2=0 a3=7ffc4a9729bc items=0 ppid=1379 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.659000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 8 00:47:28.660000 audit[1431]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.660000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff9d2e7db0 a2=0 a3=7fff9d2e7d9c items=0 ppid=1379 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.660000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 8 00:47:28.662000 audit[1433]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.662000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc70e1a5a0 a2=0 a3=7ffc70e1a58c items=0 ppid=1379 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.662000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:47:28.682000 audit[1437]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.682000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe779aa4a0 a2=0 a3=7ffe779aa48c items=0 ppid=1379 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.682000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:47:28.687000 audit[1438]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.687000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe908d9d80 a2=0 a3=7ffe908d9d6c items=0 ppid=1379 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.687000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:47:28.697677 kernel: Initializing XFRM netlink socket May 8 00:47:28.730978 env[1379]: time="2025-05-08T00:47:28.730918266Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 8 00:47:28.749000 audit[1446]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.749000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc1565a5e0 a2=0 a3=7ffc1565a5cc items=0 ppid=1379 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 8 00:47:28.761000 audit[1449]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.761000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffed9457d20 a2=0 a3=7ffed9457d0c items=0 ppid=1379 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.761000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 8 00:47:28.765000 audit[1452]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.765000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffa8b0d510 a2=0 a3=7fffa8b0d4fc items=0 ppid=1379 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.765000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 8 00:47:28.767000 audit[1454]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.767000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffca10fa240 a2=0 a3=7ffca10fa22c items=0 ppid=1379 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 8 00:47:28.769000 audit[1456]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.769000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdbbb2d650 a2=0 a3=7ffdbbb2d63c items=0 ppid=1379 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.769000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 8 00:47:28.771000 audit[1458]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.771000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd2b619740 a2=0 a3=7ffd2b61972c items=0 ppid=1379 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 8 00:47:28.773000 audit[1460]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.773000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffa0a12550 a2=0 a3=7fffa0a1253c items=0 ppid=1379 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.773000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 8 00:47:28.781000 audit[1463]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.781000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe840cacd0 a2=0 a3=7ffe840cacbc items=0 ppid=1379 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.781000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 8 00:47:28.784000 audit[1465]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.784000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffda6432b90 a2=0 a3=7ffda6432b7c items=0 ppid=1379 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.784000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:47:28.786000 audit[1467]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.786000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffea91faee0 a2=0 a3=7ffea91faecc items=0 ppid=1379 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:47:28.788000 audit[1469]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.788000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd93bfe920 a2=0 a3=7ffd93bfe90c items=0 ppid=1379 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 8 00:47:28.789819 systemd-networkd[1025]: docker0: Link UP May 8 00:47:28.800000 audit[1473]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.800000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff92f27ff0 a2=0 a3=7fff92f27fdc items=0 ppid=1379 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.800000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:47:28.807000 audit[1474]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:47:28.807000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd1d981490 a2=0 a3=7ffd1d98147c items=0 ppid=1379 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:28.807000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:47:28.808225 env[1379]: time="2025-05-08T00:47:28.808178144Z" level=info msg="Loading containers: done." May 8 00:47:28.822499 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck880791714-merged.mount: Deactivated successfully. May 8 00:47:28.857384 env[1379]: time="2025-05-08T00:47:28.857283041Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 8 00:47:28.857609 env[1379]: time="2025-05-08T00:47:28.857531707Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 8 00:47:28.857700 env[1379]: time="2025-05-08T00:47:28.857686848Z" level=info msg="Daemon has completed initialization" May 8 00:47:28.892212 systemd[1]: Started docker.service. May 8 00:47:28.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:28.924328 env[1379]: time="2025-05-08T00:47:28.924215206Z" level=info msg="API listen on /run/docker.sock" May 8 00:47:30.451069 env[1211]: time="2025-05-08T00:47:30.450985100Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 8 00:47:33.850558 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3975283358.mount: Deactivated successfully. May 8 00:47:36.259774 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 8 00:47:36.269722 kernel: kauditd_printk_skb: 86 callbacks suppressed May 8 00:47:36.269775 kernel: audit: type=1130 audit(1746665256.259:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:36.269802 kernel: audit: type=1131 audit(1746665256.259:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:36.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:36.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:36.259963 systemd[1]: Stopped kubelet.service. May 8 00:47:36.261471 systemd[1]: Starting kubelet.service... May 8 00:47:36.344271 systemd[1]: Started kubelet.service. May 8 00:47:36.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:36.348669 kernel: audit: type=1130 audit(1746665256.343:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:36.414241 kubelet[1522]: E0508 00:47:36.414167 1522 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:47:36.416559 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:47:36.416742 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:47:36.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:47:36.421672 kernel: audit: type=1131 audit(1746665256.416:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:47:36.926324 env[1211]: time="2025-05-08T00:47:36.926255507Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:36.931873 env[1211]: time="2025-05-08T00:47:36.931809885Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:36.938205 env[1211]: time="2025-05-08T00:47:36.938147633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:36.941054 env[1211]: time="2025-05-08T00:47:36.941015081Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:36.941869 env[1211]: time="2025-05-08T00:47:36.941828096Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 8 00:47:36.952805 env[1211]: time="2025-05-08T00:47:36.952741877Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 8 00:47:41.722297 env[1211]: time="2025-05-08T00:47:41.722219524Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:41.726387 env[1211]: time="2025-05-08T00:47:41.726315467Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:41.730139 env[1211]: time="2025-05-08T00:47:41.730086951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:41.732540 env[1211]: time="2025-05-08T00:47:41.732426930Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:41.734724 env[1211]: time="2025-05-08T00:47:41.734642035Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 8 00:47:41.755112 env[1211]: time="2025-05-08T00:47:41.755026661Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 8 00:47:44.082484 env[1211]: time="2025-05-08T00:47:44.082388276Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:44.084516 env[1211]: time="2025-05-08T00:47:44.084458950Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:44.087005 env[1211]: time="2025-05-08T00:47:44.086922291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:44.089225 env[1211]: time="2025-05-08T00:47:44.089153776Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:44.089986 env[1211]: time="2025-05-08T00:47:44.089929201Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 8 00:47:44.103099 env[1211]: time="2025-05-08T00:47:44.103045293Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 8 00:47:46.039262 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount212695948.mount: Deactivated successfully. May 8 00:47:46.509862 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 8 00:47:46.510098 systemd[1]: Stopped kubelet.service. May 8 00:47:46.517927 kernel: audit: type=1130 audit(1746665266.509:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:46.517980 kernel: audit: type=1131 audit(1746665266.509:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:46.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:46.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:46.512141 systemd[1]: Starting kubelet.service... May 8 00:47:46.613339 systemd[1]: Started kubelet.service. May 8 00:47:46.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:46.618690 kernel: audit: type=1130 audit(1746665266.613:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:46.716233 kubelet[1554]: E0508 00:47:46.716167 1554 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:47:46.719043 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:47:46.719175 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:47:46.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:47:46.723679 kernel: audit: type=1131 audit(1746665266.718:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:47:47.823773 env[1211]: time="2025-05-08T00:47:47.823690492Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:47.889707 env[1211]: time="2025-05-08T00:47:47.889618465Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:47.945353 env[1211]: time="2025-05-08T00:47:47.945269725Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:47.947803 env[1211]: time="2025-05-08T00:47:47.947722402Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:47.948104 env[1211]: time="2025-05-08T00:47:47.948073676Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 8 00:47:47.964276 env[1211]: time="2025-05-08T00:47:47.964206189Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 8 00:47:48.753882 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1370774705.mount: Deactivated successfully. May 8 00:47:51.104029 env[1211]: time="2025-05-08T00:47:51.103947654Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:51.111534 env[1211]: time="2025-05-08T00:47:51.111472160Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:51.113454 env[1211]: time="2025-05-08T00:47:51.113425440Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:51.115283 env[1211]: time="2025-05-08T00:47:51.115249543Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:51.115898 env[1211]: time="2025-05-08T00:47:51.115873985Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 8 00:47:51.126586 env[1211]: time="2025-05-08T00:47:51.126532467Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 8 00:47:51.642977 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3233694511.mount: Deactivated successfully. May 8 00:47:51.649208 env[1211]: time="2025-05-08T00:47:51.649144803Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:51.651180 env[1211]: time="2025-05-08T00:47:51.651115205Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:51.652874 env[1211]: time="2025-05-08T00:47:51.652830210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:51.654443 env[1211]: time="2025-05-08T00:47:51.654408633Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:51.655081 env[1211]: time="2025-05-08T00:47:51.655027084Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 8 00:47:51.667516 env[1211]: time="2025-05-08T00:47:51.667463309Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 8 00:47:52.338485 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount984446848.mount: Deactivated successfully. May 8 00:47:56.760026 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 8 00:47:56.947376 kernel: audit: type=1130 audit(1746665276.758:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:56.947487 kernel: audit: type=1131 audit(1746665276.758:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:56.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:56.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:56.760265 systemd[1]: Stopped kubelet.service. May 8 00:47:56.762454 systemd[1]: Starting kubelet.service... May 8 00:47:57.673160 systemd[1]: Started kubelet.service. May 8 00:47:57.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:57.707711 kernel: audit: type=1130 audit(1746665277.671:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:57.772445 kubelet[1587]: E0508 00:47:57.772375 1587 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:47:57.774567 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:47:57.774775 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:47:57.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:47:57.779679 kernel: audit: type=1131 audit(1746665277.773:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:47:58.579034 env[1211]: time="2025-05-08T00:47:58.578946446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:58.581093 env[1211]: time="2025-05-08T00:47:58.581040188Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:58.583166 env[1211]: time="2025-05-08T00:47:58.583112700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:58.584731 env[1211]: time="2025-05-08T00:47:58.584685454Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:47:58.585391 env[1211]: time="2025-05-08T00:47:58.585350846Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 8 00:47:59.064261 update_engine[1202]: I0508 00:47:59.064200 1202 update_attempter.cc:509] Updating boot flags... May 8 00:48:01.655771 systemd[1]: Stopped kubelet.service. May 8 00:48:01.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:01.658028 systemd[1]: Starting kubelet.service... May 8 00:48:01.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:01.663105 kernel: audit: type=1130 audit(1746665281.654:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:01.663167 kernel: audit: type=1131 audit(1746665281.654:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:01.671255 systemd[1]: Reloading. May 8 00:48:01.739698 /usr/lib/systemd/system-generators/torcx-generator[1710]: time="2025-05-08T00:48:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:48:01.741595 /usr/lib/systemd/system-generators/torcx-generator[1710]: time="2025-05-08T00:48:01Z" level=info msg="torcx already run" May 8 00:48:02.347049 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:48:02.347070 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:48:02.365997 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:48:02.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.441700 kernel: audit: type=1400 audit(1746665282.433:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.441789 kernel: audit: type=1400 audit(1746665282.433:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.441811 kernel: audit: type=1400 audit(1746665282.433:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.448099 kernel: audit: type=1400 audit(1746665282.433:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.448146 kernel: audit: type=1400 audit(1746665282.433:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.451300 kernel: audit: type=1400 audit(1746665282.433:254): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.454506 kernel: audit: type=1400 audit(1746665282.433:255): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.461173 kernel: audit: type=1400 audit(1746665282.433:256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.461234 kernel: audit: type=1400 audit(1746665282.433:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464333 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 8 00:48:02.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.440000 audit: BPF prog-id=40 op=LOAD May 8 00:48:02.440000 audit: BPF prog-id=33 op=UNLOAD May 8 00:48:02.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.446000 audit: BPF prog-id=41 op=LOAD May 8 00:48:02.446000 audit: BPF prog-id=35 op=UNLOAD May 8 00:48:02.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.449000 audit: BPF prog-id=42 op=LOAD May 8 00:48:02.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.452000 audit: BPF prog-id=43 op=LOAD May 8 00:48:02.452000 audit: BPF prog-id=36 op=UNLOAD May 8 00:48:02.452000 audit: BPF prog-id=37 op=UNLOAD May 8 00:48:02.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.456000 audit: BPF prog-id=44 op=LOAD May 8 00:48:02.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.459000 audit: BPF prog-id=45 op=LOAD May 8 00:48:02.459000 audit: BPF prog-id=24 op=UNLOAD May 8 00:48:02.459000 audit: BPF prog-id=25 op=UNLOAD May 8 00:48:02.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit: BPF prog-id=46 op=LOAD May 8 00:48:02.464000 audit: BPF prog-id=38 op=UNLOAD May 8 00:48:02.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit: BPF prog-id=47 op=LOAD May 8 00:48:02.465000 audit: BPF prog-id=26 op=UNLOAD May 8 00:48:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit: BPF prog-id=48 op=LOAD May 8 00:48:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.465000 audit: BPF prog-id=49 op=LOAD May 8 00:48:02.465000 audit: BPF prog-id=27 op=UNLOAD May 8 00:48:02.465000 audit: BPF prog-id=28 op=UNLOAD May 8 00:48:02.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.467000 audit: BPF prog-id=50 op=LOAD May 8 00:48:02.467000 audit: BPF prog-id=29 op=UNLOAD May 8 00:48:02.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit: BPF prog-id=51 op=LOAD May 8 00:48:02.468000 audit: BPF prog-id=34 op=UNLOAD May 8 00:48:02.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit: BPF prog-id=52 op=LOAD May 8 00:48:02.469000 audit: BPF prog-id=30 op=UNLOAD May 8 00:48:02.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit: BPF prog-id=53 op=LOAD May 8 00:48:02.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.469000 audit: BPF prog-id=54 op=LOAD May 8 00:48:02.469000 audit: BPF prog-id=31 op=UNLOAD May 8 00:48:02.469000 audit: BPF prog-id=32 op=UNLOAD May 8 00:48:02.481621 systemd[1]: Started kubelet.service. May 8 00:48:02.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:02.483103 systemd[1]: Stopping kubelet.service... May 8 00:48:02.483421 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:48:02.483635 systemd[1]: Stopped kubelet.service. May 8 00:48:02.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:02.485496 systemd[1]: Starting kubelet.service... May 8 00:48:02.571122 systemd[1]: Started kubelet.service. May 8 00:48:02.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:02.691308 kubelet[1758]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:48:02.691308 kubelet[1758]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 8 00:48:02.691308 kubelet[1758]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:48:02.692818 kubelet[1758]: I0508 00:48:02.692727 1758 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:48:02.798474 kubelet[1758]: I0508 00:48:02.798418 1758 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 8 00:48:02.798474 kubelet[1758]: I0508 00:48:02.798457 1758 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:48:02.800504 kubelet[1758]: I0508 00:48:02.800461 1758 server.go:927] "Client rotation is on, will bootstrap in background" May 8 00:48:02.819628 kubelet[1758]: E0508 00:48:02.819561 1758 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.87:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:02.821337 kubelet[1758]: I0508 00:48:02.821190 1758 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:48:02.834489 kubelet[1758]: I0508 00:48:02.834429 1758 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:48:02.837521 kubelet[1758]: I0508 00:48:02.837461 1758 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:48:02.837750 kubelet[1758]: I0508 00:48:02.837508 1758 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 8 00:48:02.837750 kubelet[1758]: I0508 00:48:02.837751 1758 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:48:02.837982 kubelet[1758]: I0508 00:48:02.837765 1758 container_manager_linux.go:301] "Creating device plugin manager" May 8 00:48:02.837982 kubelet[1758]: I0508 00:48:02.837902 1758 state_mem.go:36] "Initialized new in-memory state store" May 8 00:48:02.838916 kubelet[1758]: I0508 00:48:02.838885 1758 kubelet.go:400] "Attempting to sync node with API server" May 8 00:48:02.838916 kubelet[1758]: I0508 00:48:02.838907 1758 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:48:02.839001 kubelet[1758]: I0508 00:48:02.838931 1758 kubelet.go:312] "Adding apiserver pod source" May 8 00:48:02.839001 kubelet[1758]: I0508 00:48:02.838949 1758 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:48:02.842356 kubelet[1758]: W0508 00:48:02.842286 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.87:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:02.842356 kubelet[1758]: E0508 00:48:02.842363 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.87:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:02.853367 kubelet[1758]: W0508 00:48:02.853323 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.87:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:02.853367 kubelet[1758]: E0508 00:48:02.853358 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.87:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:02.857900 kubelet[1758]: I0508 00:48:02.857859 1758 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:48:02.862542 kubelet[1758]: I0508 00:48:02.862506 1758 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:48:02.863002 kubelet[1758]: W0508 00:48:02.862975 1758 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 8 00:48:02.863984 kubelet[1758]: I0508 00:48:02.863960 1758 server.go:1264] "Started kubelet" May 8 00:48:02.863000 audit[1758]: AVC avc: denied { mac_admin } for pid=1758 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.863000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:48:02.863000 audit[1758]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005e1da0 a1=c000679290 a2=c0005e1d70 a3=25 items=0 ppid=1 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.863000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:48:02.863000 audit[1758]: AVC avc: denied { mac_admin } for pid=1758 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:02.863000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:48:02.863000 audit[1758]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007084a0 a1=c0006792a8 a2=c0005e1e30 a3=25 items=0 ppid=1 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.863000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:48:02.865886 kubelet[1758]: I0508 00:48:02.865445 1758 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:48:02.865886 kubelet[1758]: I0508 00:48:02.865504 1758 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 8 00:48:02.865886 kubelet[1758]: I0508 00:48:02.865607 1758 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:48:02.866363 kubelet[1758]: I0508 00:48:02.866302 1758 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:48:02.867601 kubelet[1758]: I0508 00:48:02.867015 1758 volume_manager.go:291] "Starting Kubelet Volume Manager" May 8 00:48:02.867601 kubelet[1758]: I0508 00:48:02.867163 1758 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:48:02.867601 kubelet[1758]: I0508 00:48:02.867246 1758 reconciler.go:26] "Reconciler: start to sync state" May 8 00:48:02.867744 kubelet[1758]: I0508 00:48:02.867671 1758 server.go:455] "Adding debug handlers to kubelet server" May 8 00:48:02.867744 kubelet[1758]: W0508 00:48:02.867661 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.87:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:02.867744 kubelet[1758]: E0508 00:48:02.867717 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.87:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:02.868623 kubelet[1758]: I0508 00:48:02.868553 1758 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:48:02.868831 kubelet[1758]: I0508 00:48:02.868803 1758 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:48:02.867000 audit[1770]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:02.867000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd6e97f540 a2=0 a3=7ffd6e97f52c items=0 ppid=1758 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:48:02.868000 audit[1771]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:02.868000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe57b7c700 a2=0 a3=7ffe57b7c6ec items=0 ppid=1758 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:48:02.872582 kubelet[1758]: E0508 00:48:02.870572 1758 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.87:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.87:6443: connect: connection refused" interval="200ms" May 8 00:48:02.872582 kubelet[1758]: I0508 00:48:02.871515 1758 factory.go:221] Registration of the systemd container factory successfully May 8 00:48:02.872582 kubelet[1758]: I0508 00:48:02.871580 1758 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:48:02.874000 audit[1773]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:02.874000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdabaa3d90 a2=0 a3=7ffdabaa3d7c items=0 ppid=1758 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:48:02.876289 kubelet[1758]: I0508 00:48:02.876250 1758 factory.go:221] Registration of the containerd container factory successfully May 8 00:48:02.876000 audit[1775]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:02.876000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcdaeb6550 a2=0 a3=7ffcdaeb653c items=0 ppid=1758 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.876000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:48:02.878199 kubelet[1758]: E0508 00:48:02.877872 1758 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.87:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.87:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183d66d20e9c919d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-08 00:48:02.863927709 +0000 UTC m=+0.288986867,LastTimestamp:2025-05-08 00:48:02.863927709 +0000 UTC m=+0.288986867,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 8 00:48:02.884000 audit[1778]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:02.884000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff72fa62f0 a2=0 a3=7fff72fa62dc items=0 ppid=1758 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 8 00:48:02.886617 kubelet[1758]: E0508 00:48:02.884202 1758 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:48:02.886617 kubelet[1758]: I0508 00:48:02.886088 1758 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:48:02.885000 audit[1780]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:02.885000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc6a89db0 a2=0 a3=7ffcc6a89d9c items=0 ppid=1758 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.885000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:48:02.887494 kubelet[1758]: I0508 00:48:02.887198 1758 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:48:02.887494 kubelet[1758]: I0508 00:48:02.887223 1758 status_manager.go:217] "Starting to sync pod status with apiserver" May 8 00:48:02.887494 kubelet[1758]: I0508 00:48:02.887249 1758 kubelet.go:2337] "Starting kubelet main sync loop" May 8 00:48:02.887494 kubelet[1758]: E0508 00:48:02.887298 1758 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:48:02.924803 kubelet[1758]: W0508 00:48:02.924734 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.87:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:02.924803 kubelet[1758]: E0508 00:48:02.924807 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.87:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:02.924000 audit[1786]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:02.924000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9850eeb0 a2=0 a3=7ffd9850ee9c items=0 ppid=1758 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.924000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:48:02.924000 audit[1785]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:02.924000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd48cba640 a2=0 a3=10e3 items=0 ppid=1758 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.924000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:48:02.926000 audit[1790]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:02.926000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff907bdca0 a2=0 a3=7fff907bdc8c items=0 ppid=1758 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.926000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:48:02.926000 audit[1789]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:02.926000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff569e2d70 a2=0 a3=7fff569e2d5c items=0 ppid=1758 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.926000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:48:02.928251 kubelet[1758]: I0508 00:48:02.928223 1758 cpu_manager.go:214] "Starting CPU manager" policy="none" May 8 00:48:02.928251 kubelet[1758]: I0508 00:48:02.928242 1758 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 8 00:48:02.928362 kubelet[1758]: I0508 00:48:02.928260 1758 state_mem.go:36] "Initialized new in-memory state store" May 8 00:48:02.927000 audit[1791]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:02.927000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffda8e3b690 a2=0 a3=7ffda8e3b67c items=0 ppid=1758 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.927000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:48:02.927000 audit[1792]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:02.927000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc91ff1f80 a2=0 a3=7ffc91ff1f6c items=0 ppid=1758 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:02.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:48:02.969122 kubelet[1758]: I0508 00:48:02.968997 1758 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:48:02.969427 kubelet[1758]: E0508 00:48:02.969401 1758 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.87:6443/api/v1/nodes\": dial tcp 10.0.0.87:6443: connect: connection refused" node="localhost" May 8 00:48:02.987876 kubelet[1758]: E0508 00:48:02.987799 1758 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 8 00:48:03.071967 kubelet[1758]: E0508 00:48:03.071910 1758 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.87:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.87:6443: connect: connection refused" interval="400ms" May 8 00:48:03.171413 kubelet[1758]: I0508 00:48:03.171359 1758 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:48:03.171824 kubelet[1758]: E0508 00:48:03.171797 1758 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.87:6443/api/v1/nodes\": dial tcp 10.0.0.87:6443: connect: connection refused" node="localhost" May 8 00:48:03.189088 kubelet[1758]: E0508 00:48:03.188964 1758 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 8 00:48:03.406097 kubelet[1758]: I0508 00:48:03.405975 1758 policy_none.go:49] "None policy: Start" May 8 00:48:03.406918 kubelet[1758]: I0508 00:48:03.406849 1758 memory_manager.go:170] "Starting memorymanager" policy="None" May 8 00:48:03.406918 kubelet[1758]: I0508 00:48:03.406875 1758 state_mem.go:35] "Initializing new in-memory state store" May 8 00:48:03.473302 kubelet[1758]: E0508 00:48:03.473228 1758 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.87:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.87:6443: connect: connection refused" interval="800ms" May 8 00:48:03.538790 systemd[1]: Created slice kubepods.slice. May 8 00:48:03.543281 systemd[1]: Created slice kubepods-burstable.slice. May 8 00:48:03.545878 systemd[1]: Created slice kubepods-besteffort.slice. May 8 00:48:03.558479 kubelet[1758]: I0508 00:48:03.558443 1758 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:48:03.556000 audit[1758]: AVC avc: denied { mac_admin } for pid=1758 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:03.556000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:48:03.556000 audit[1758]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dfe6f0 a1=c000e70378 a2=c000dfe6c0 a3=25 items=0 ppid=1 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:03.556000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:48:03.558951 kubelet[1758]: I0508 00:48:03.558526 1758 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:48:03.558951 kubelet[1758]: I0508 00:48:03.558714 1758 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:48:03.558951 kubelet[1758]: I0508 00:48:03.558860 1758 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:48:03.560384 kubelet[1758]: E0508 00:48:03.560355 1758 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 8 00:48:03.573618 kubelet[1758]: I0508 00:48:03.573558 1758 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:48:03.574033 kubelet[1758]: E0508 00:48:03.574001 1758 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.87:6443/api/v1/nodes\": dial tcp 10.0.0.87:6443: connect: connection refused" node="localhost" May 8 00:48:03.590265 kubelet[1758]: I0508 00:48:03.590196 1758 topology_manager.go:215] "Topology Admit Handler" podUID="d89a7e2a8e6c92e2487aa645685800d8" podNamespace="kube-system" podName="kube-apiserver-localhost" May 8 00:48:03.591350 kubelet[1758]: I0508 00:48:03.591324 1758 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 8 00:48:03.592103 kubelet[1758]: I0508 00:48:03.592018 1758 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 8 00:48:03.596588 systemd[1]: Created slice kubepods-burstable-podd89a7e2a8e6c92e2487aa645685800d8.slice. May 8 00:48:03.609506 systemd[1]: Created slice kubepods-burstable-podb20b39a8540dba87b5883a6f0f602dba.slice. May 8 00:48:03.614092 systemd[1]: Created slice kubepods-burstable-pod6ece95f10dbffa04b25ec3439a115512.slice. May 8 00:48:03.672298 kubelet[1758]: I0508 00:48:03.672149 1758 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:48:03.672298 kubelet[1758]: I0508 00:48:03.672212 1758 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:48:03.672298 kubelet[1758]: I0508 00:48:03.672237 1758 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 8 00:48:03.672298 kubelet[1758]: I0508 00:48:03.672255 1758 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d89a7e2a8e6c92e2487aa645685800d8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d89a7e2a8e6c92e2487aa645685800d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:48:03.672500 kubelet[1758]: I0508 00:48:03.672324 1758 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d89a7e2a8e6c92e2487aa645685800d8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d89a7e2a8e6c92e2487aa645685800d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:48:03.672500 kubelet[1758]: I0508 00:48:03.672361 1758 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:48:03.672500 kubelet[1758]: I0508 00:48:03.672416 1758 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d89a7e2a8e6c92e2487aa645685800d8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d89a7e2a8e6c92e2487aa645685800d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:48:03.672500 kubelet[1758]: I0508 00:48:03.672432 1758 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:48:03.672684 kubelet[1758]: I0508 00:48:03.672638 1758 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:48:03.710895 kubelet[1758]: W0508 00:48:03.710797 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.87:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:03.710895 kubelet[1758]: E0508 00:48:03.710878 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.87:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:03.907989 kubelet[1758]: E0508 00:48:03.907930 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:03.908722 env[1211]: time="2025-05-08T00:48:03.908685163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d89a7e2a8e6c92e2487aa645685800d8,Namespace:kube-system,Attempt:0,}" May 8 00:48:03.912801 kubelet[1758]: E0508 00:48:03.912767 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:03.913274 env[1211]: time="2025-05-08T00:48:03.913216684Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,}" May 8 00:48:03.916309 kubelet[1758]: E0508 00:48:03.916288 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:03.916623 env[1211]: time="2025-05-08T00:48:03.916588670Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,}" May 8 00:48:04.274945 kubelet[1758]: E0508 00:48:04.274863 1758 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.87:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.87:6443: connect: connection refused" interval="1.6s" May 8 00:48:04.281401 kubelet[1758]: W0508 00:48:04.281342 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.87:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:04.281401 kubelet[1758]: E0508 00:48:04.281402 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.87:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:04.297068 kubelet[1758]: W0508 00:48:04.296973 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.87:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:04.297068 kubelet[1758]: E0508 00:48:04.297061 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.87:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:04.304300 kubelet[1758]: W0508 00:48:04.304234 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.87:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:04.304300 kubelet[1758]: E0508 00:48:04.304290 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.87:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:04.376276 kubelet[1758]: I0508 00:48:04.376228 1758 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:48:04.376588 kubelet[1758]: E0508 00:48:04.376549 1758 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.87:6443/api/v1/nodes\": dial tcp 10.0.0.87:6443: connect: connection refused" node="localhost" May 8 00:48:04.872686 kubelet[1758]: E0508 00:48:04.872618 1758 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.87:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:04.931982 kubelet[1758]: E0508 00:48:04.931821 1758 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.87:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.87:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183d66d20e9c919d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-08 00:48:02.863927709 +0000 UTC m=+0.288986867,LastTimestamp:2025-05-08 00:48:02.863927709 +0000 UTC m=+0.288986867,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 8 00:48:05.875581 kubelet[1758]: E0508 00:48:05.875502 1758 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.87:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.87:6443: connect: connection refused" interval="3.2s" May 8 00:48:05.978669 kubelet[1758]: I0508 00:48:05.978599 1758 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:48:05.979004 kubelet[1758]: E0508 00:48:05.978962 1758 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.87:6443/api/v1/nodes\": dial tcp 10.0.0.87:6443: connect: connection refused" node="localhost" May 8 00:48:06.264697 kubelet[1758]: W0508 00:48:06.264625 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.87:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:06.264697 kubelet[1758]: E0508 00:48:06.264684 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.87:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:06.613672 kubelet[1758]: W0508 00:48:06.613509 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.87:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:06.613672 kubelet[1758]: E0508 00:48:06.613567 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.87:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:06.675366 kubelet[1758]: W0508 00:48:06.675304 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.87:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:06.675366 kubelet[1758]: E0508 00:48:06.675347 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.87:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:06.911703 kubelet[1758]: W0508 00:48:06.911525 1758 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.87:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:06.911703 kubelet[1758]: E0508 00:48:06.911594 1758 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.87:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.87:6443: connect: connection refused May 8 00:48:08.616029 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount113243177.mount: Deactivated successfully. May 8 00:48:08.628921 env[1211]: time="2025-05-08T00:48:08.628832937Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.637034 env[1211]: time="2025-05-08T00:48:08.636958780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.640134 env[1211]: time="2025-05-08T00:48:08.640019566Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.643250 env[1211]: time="2025-05-08T00:48:08.643159491Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.648372 env[1211]: time="2025-05-08T00:48:08.648335687Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.649565 env[1211]: time="2025-05-08T00:48:08.649534911Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.651531 env[1211]: time="2025-05-08T00:48:08.651451587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.657080 env[1211]: time="2025-05-08T00:48:08.656963227Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.658742 env[1211]: time="2025-05-08T00:48:08.658705365Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.661809 env[1211]: time="2025-05-08T00:48:08.661729551Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.663310 env[1211]: time="2025-05-08T00:48:08.663262644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.670551 env[1211]: time="2025-05-08T00:48:08.670438996Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:08.694924 env[1211]: time="2025-05-08T00:48:08.692623166Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:48:08.694924 env[1211]: time="2025-05-08T00:48:08.692784249Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:48:08.694924 env[1211]: time="2025-05-08T00:48:08.692818825Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:48:08.696933 env[1211]: time="2025-05-08T00:48:08.696848639Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d0cb6eb023c25f968444ef74086bdd444777c410aac52400ef1e359f5b976277 pid=1800 runtime=io.containerd.runc.v2 May 8 00:48:08.712779 env[1211]: time="2025-05-08T00:48:08.712447914Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:48:08.712779 env[1211]: time="2025-05-08T00:48:08.712487519Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:48:08.712779 env[1211]: time="2025-05-08T00:48:08.712497548Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:48:08.712779 env[1211]: time="2025-05-08T00:48:08.712629657Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c9364678c46297e71e6c49c0c56530ba3d95c6c92af87ba2a3ea20a168014c50 pid=1831 runtime=io.containerd.runc.v2 May 8 00:48:08.712779 env[1211]: time="2025-05-08T00:48:08.712407689Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:48:08.712779 env[1211]: time="2025-05-08T00:48:08.712547542Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:48:08.712779 env[1211]: time="2025-05-08T00:48:08.712572018Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:48:08.713622 env[1211]: time="2025-05-08T00:48:08.712835034Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/726f21f68fbffb47fcc89ea0fbad682c3372f77bf74f979e4ebffdbeddf551e2 pid=1830 runtime=io.containerd.runc.v2 May 8 00:48:08.716340 systemd[1]: Started cri-containerd-d0cb6eb023c25f968444ef74086bdd444777c410aac52400ef1e359f5b976277.scope. May 8 00:48:08.728261 systemd[1]: Started cri-containerd-c9364678c46297e71e6c49c0c56530ba3d95c6c92af87ba2a3ea20a168014c50.scope. May 8 00:48:08.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.738741 kernel: kauditd_printk_skb: 215 callbacks suppressed May 8 00:48:08.738813 kernel: audit: type=1400 audit(1746665288.734:438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.746910 kernel: audit: type=1400 audit(1746665288.734:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.750679 kernel: audit: type=1400 audit(1746665288.734:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.749872 systemd[1]: Started cri-containerd-726f21f68fbffb47fcc89ea0fbad682c3372f77bf74f979e4ebffdbeddf551e2.scope. May 8 00:48:08.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.754672 kernel: audit: type=1400 audit(1746665288.734:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.761790 kernel: audit: type=1400 audit(1746665288.734:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.761851 kernel: audit: type=1400 audit(1746665288.734:443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768521 kernel: audit: type=1400 audit(1746665288.734:444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768583 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 8 00:48:08.768607 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 8 00:48:08.768625 kernel: audit: backlog limit exceeded May 8 00:48:08.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.735000 audit: BPF prog-id=55 op=LOAD May 8 00:48:08.742000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1800 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636236656230323363323566393638343434656637343038366264 May 8 00:48:08.742000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1800 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636236656230323363323566393638343434656637343038366264 May 8 00:48:08.742000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.742000 audit: BPF prog-id=56 op=LOAD May 8 00:48:08.742000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003086a0 items=0 ppid=1800 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636236656230323363323566393638343434656637343038366264 May 8 00:48:08.749000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.749000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.749000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.749000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.749000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.749000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.749000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.749000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit: BPF prog-id=57 op=LOAD May 8 00:48:08.757000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1831 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339333634363738633436323937653731653663343963306335363533 May 8 00:48:08.757000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1831 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339333634363738633436323937653731653663343963306335363533 May 8 00:48:08.757000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.757000 audit: BPF prog-id=58 op=LOAD May 8 00:48:08.757000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e89d0 items=0 ppid=1831 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.767000 audit: BPF prog-id=60 op=LOAD May 8 00:48:08.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339333634363738633436323937653731653663343963306335363533 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1830 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732366632316636386662666662343766636338396561306662616436 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1830 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732366632316636386662666662343766636338396561306662616436 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit: BPF prog-id=61 op=LOAD May 8 00:48:08.768000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00028f4d0 items=0 ppid=1830 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732366632316636386662666662343766636338396561306662616436 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit: BPF prog-id=62 op=LOAD May 8 00:48:08.768000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00028f518 items=0 ppid=1830 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732366632316636386662666662343766636338396561306662616436 May 8 00:48:08.768000 audit: BPF prog-id=62 op=UNLOAD May 8 00:48:08.768000 audit: BPF prog-id=61 op=UNLOAD May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit: BPF prog-id=63 op=LOAD May 8 00:48:08.768000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00028f928 items=0 ppid=1830 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732366632316636386662666662343766636338396561306662616436 May 8 00:48:08.768000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.768000 audit: BPF prog-id=64 op=LOAD May 8 00:48:08.768000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e8a18 items=0 ppid=1831 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339333634363738633436323937653731653663343963306335363533 May 8 00:48:08.768000 audit: BPF prog-id=64 op=UNLOAD May 8 00:48:08.769000 audit: BPF prog-id=58 op=UNLOAD May 8 00:48:08.769000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1853]: AVC avc: denied { perfmon } for pid=1853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1853]: AVC avc: denied { bpf } for pid=1853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit: BPF prog-id=65 op=LOAD May 8 00:48:08.769000 audit[1853]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e8e28 items=0 ppid=1831 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339333634363738633436323937653731653663343963306335363533 May 8 00:48:08.749000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003086e8 items=0 ppid=1800 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636236656230323363323566393638343434656637343038366264 May 8 00:48:08.769000 audit: BPF prog-id=59 op=UNLOAD May 8 00:48:08.769000 audit: BPF prog-id=56 op=UNLOAD May 8 00:48:08.769000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.769000 audit: BPF prog-id=66 op=LOAD May 8 00:48:08.769000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308af8 items=0 ppid=1800 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430636236656230323363323566393638343434656637343038366264 May 8 00:48:08.798165 env[1211]: time="2025-05-08T00:48:08.798086761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,} returns sandbox id \"726f21f68fbffb47fcc89ea0fbad682c3372f77bf74f979e4ebffdbeddf551e2\"" May 8 00:48:08.800201 kubelet[1758]: E0508 00:48:08.799839 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:08.801961 env[1211]: time="2025-05-08T00:48:08.801923410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d89a7e2a8e6c92e2487aa645685800d8,Namespace:kube-system,Attempt:0,} returns sandbox id \"d0cb6eb023c25f968444ef74086bdd444777c410aac52400ef1e359f5b976277\"" May 8 00:48:08.803668 env[1211]: time="2025-05-08T00:48:08.802282407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,} returns sandbox id \"c9364678c46297e71e6c49c0c56530ba3d95c6c92af87ba2a3ea20a168014c50\"" May 8 00:48:08.805807 env[1211]: time="2025-05-08T00:48:08.805291696Z" level=info msg="CreateContainer within sandbox \"726f21f68fbffb47fcc89ea0fbad682c3372f77bf74f979e4ebffdbeddf551e2\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 8 00:48:08.805985 kubelet[1758]: E0508 00:48:08.805448 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:08.805985 kubelet[1758]: E0508 00:48:08.805687 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:08.809234 env[1211]: time="2025-05-08T00:48:08.809179572Z" level=info msg="CreateContainer within sandbox \"c9364678c46297e71e6c49c0c56530ba3d95c6c92af87ba2a3ea20a168014c50\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 8 00:48:08.810562 env[1211]: time="2025-05-08T00:48:08.810390897Z" level=info msg="CreateContainer within sandbox \"d0cb6eb023c25f968444ef74086bdd444777c410aac52400ef1e359f5b976277\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 8 00:48:08.842412 env[1211]: time="2025-05-08T00:48:08.842296932Z" level=info msg="CreateContainer within sandbox \"726f21f68fbffb47fcc89ea0fbad682c3372f77bf74f979e4ebffdbeddf551e2\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"67e4b2e33a2d72d80db3badff0e27dbc81635302e3db6df37b91175f48cdd16c\"" May 8 00:48:08.843411 env[1211]: time="2025-05-08T00:48:08.843362763Z" level=info msg="StartContainer for \"67e4b2e33a2d72d80db3badff0e27dbc81635302e3db6df37b91175f48cdd16c\"" May 8 00:48:08.851125 env[1211]: time="2025-05-08T00:48:08.851053416Z" level=info msg="CreateContainer within sandbox \"c9364678c46297e71e6c49c0c56530ba3d95c6c92af87ba2a3ea20a168014c50\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"8484e683bee7e702c9d52d12bf81a494db80a3f5da948c9edef2ab300105183b\"" May 8 00:48:08.851763 env[1211]: time="2025-05-08T00:48:08.851721877Z" level=info msg="StartContainer for \"8484e683bee7e702c9d52d12bf81a494db80a3f5da948c9edef2ab300105183b\"" May 8 00:48:08.853354 env[1211]: time="2025-05-08T00:48:08.853304723Z" level=info msg="CreateContainer within sandbox \"d0cb6eb023c25f968444ef74086bdd444777c410aac52400ef1e359f5b976277\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"65c0fe2e2176e452df2dbde6d3d4e938a2b027d987010e936e8a37034c90dcad\"" May 8 00:48:08.854058 env[1211]: time="2025-05-08T00:48:08.854024512Z" level=info msg="StartContainer for \"65c0fe2e2176e452df2dbde6d3d4e938a2b027d987010e936e8a37034c90dcad\"" May 8 00:48:08.862100 systemd[1]: Started cri-containerd-67e4b2e33a2d72d80db3badff0e27dbc81635302e3db6df37b91175f48cdd16c.scope. May 8 00:48:08.871299 systemd[1]: Started cri-containerd-8484e683bee7e702c9d52d12bf81a494db80a3f5da948c9edef2ab300105183b.scope. May 8 00:48:08.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.875000 audit: BPF prog-id=67 op=LOAD May 8 00:48:08.879414 systemd[1]: Started cri-containerd-65c0fe2e2176e452df2dbde6d3d4e938a2b027d987010e936e8a37034c90dcad.scope. May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1830 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637653462326533336132643732643830646233626164666630653237 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1830 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637653462326533336132643732643830646233626164666630653237 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit: BPF prog-id=68 op=LOAD May 8 00:48:08.879000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000282960 items=0 ppid=1830 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637653462326533336132643732643830646233626164666630653237 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit: BPF prog-id=69 op=LOAD May 8 00:48:08.879000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002829a8 items=0 ppid=1830 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637653462326533336132643732643830646233626164666630653237 May 8 00:48:08.879000 audit: BPF prog-id=69 op=UNLOAD May 8 00:48:08.879000 audit: BPF prog-id=68 op=UNLOAD May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.879000 audit: BPF prog-id=70 op=LOAD May 8 00:48:08.879000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000282db8 items=0 ppid=1830 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637653462326533336132643732643830646233626164666630653237 May 8 00:48:08.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.887000 audit: BPF prog-id=71 op=LOAD May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1831 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383465363833626565376537303263396435326431326266383161 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1831 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383465363833626565376537303263396435326431326266383161 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit: BPF prog-id=72 op=LOAD May 8 00:48:08.890000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000267d10 items=0 ppid=1831 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383465363833626565376537303263396435326431326266383161 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit: BPF prog-id=73 op=LOAD May 8 00:48:08.890000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000267d58 items=0 ppid=1831 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383465363833626565376537303263396435326431326266383161 May 8 00:48:08.890000 audit: BPF prog-id=73 op=UNLOAD May 8 00:48:08.890000 audit: BPF prog-id=72 op=UNLOAD May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.890000 audit: BPF prog-id=74 op=LOAD May 8 00:48:08.890000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d4168 items=0 ppid=1831 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383465363833626565376537303263396435326431326266383161 May 8 00:48:08.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.895000 audit: BPF prog-id=75 op=LOAD May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1800 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633066653265323137366534353264663264626465366433643465 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1800 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633066653265323137366534353264663264626465366433643465 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit: BPF prog-id=76 op=LOAD May 8 00:48:08.896000 audit[1955]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000398900 items=0 ppid=1800 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633066653265323137366534353264663264626465366433643465 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit: BPF prog-id=77 op=LOAD May 8 00:48:08.896000 audit[1955]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000398948 items=0 ppid=1800 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633066653265323137366534353264663264626465366433643465 May 8 00:48:08.896000 audit: BPF prog-id=77 op=UNLOAD May 8 00:48:08.896000 audit: BPF prog-id=76 op=UNLOAD May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { perfmon } for pid=1955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit[1955]: AVC avc: denied { bpf } for pid=1955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:08.896000 audit: BPF prog-id=78 op=LOAD May 8 00:48:08.896000 audit[1955]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000398d58 items=0 ppid=1800 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:08.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635633066653265323137366534353264663264626465366433643465 May 8 00:48:08.924779 env[1211]: time="2025-05-08T00:48:08.921788138Z" level=info msg="StartContainer for \"67e4b2e33a2d72d80db3badff0e27dbc81635302e3db6df37b91175f48cdd16c\" returns successfully" May 8 00:48:08.924779 env[1211]: time="2025-05-08T00:48:08.923195464Z" level=info msg="StartContainer for \"8484e683bee7e702c9d52d12bf81a494db80a3f5da948c9edef2ab300105183b\" returns successfully" May 8 00:48:08.939530 kubelet[1758]: E0508 00:48:08.939474 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:08.942638 kubelet[1758]: E0508 00:48:08.942589 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:09.054024 env[1211]: time="2025-05-08T00:48:09.053960765Z" level=info msg="StartContainer for \"65c0fe2e2176e452df2dbde6d3d4e938a2b027d987010e936e8a37034c90dcad\" returns successfully" May 8 00:48:09.181553 kubelet[1758]: I0508 00:48:09.181375 1758 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:48:09.954244 kubelet[1758]: E0508 00:48:09.954199 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:09.955523 kubelet[1758]: E0508 00:48:09.955507 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:10.645000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:10.645000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000374120 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:48:10.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:48:10.645000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:10.645000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000058030 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:48:10.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:48:10.954808 kubelet[1758]: E0508 00:48:10.954670 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:11.454000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:11.454000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005ea35c0 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:48:11.454000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:48:11.454000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:11.454000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005c9a580 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:48:11.454000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:48:11.454000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:11.454000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005ea3650 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:48:11.454000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:48:11.454000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:11.454000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c005ea37a0 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:48:11.454000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:48:11.455000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:11.455000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=55 a1=c0050181c0 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:48:11.455000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:48:11.456000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:11.456000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=56 a1=c005ea3ad0 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:48:11.456000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:48:11.491327 kubelet[1758]: E0508 00:48:11.491270 1758 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 8 00:48:11.767952 kubelet[1758]: I0508 00:48:11.767898 1758 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 8 00:48:11.802997 kubelet[1758]: E0508 00:48:11.802938 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:11.904106 kubelet[1758]: E0508 00:48:11.904040 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:11.956685 kubelet[1758]: E0508 00:48:11.956617 1758 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:12.004700 kubelet[1758]: E0508 00:48:12.004634 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:12.105551 kubelet[1758]: E0508 00:48:12.105360 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:12.206027 kubelet[1758]: E0508 00:48:12.205959 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:12.306486 kubelet[1758]: E0508 00:48:12.306408 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:12.407540 kubelet[1758]: E0508 00:48:12.407370 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:12.508111 kubelet[1758]: E0508 00:48:12.508046 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:12.608823 kubelet[1758]: E0508 00:48:12.608754 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:12.709829 kubelet[1758]: E0508 00:48:12.709684 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:12.810490 kubelet[1758]: E0508 00:48:12.810425 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:12.910970 kubelet[1758]: E0508 00:48:12.910923 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:13.011975 kubelet[1758]: E0508 00:48:13.011906 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:13.113089 kubelet[1758]: E0508 00:48:13.113033 1758 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:48:13.657000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 8 00:48:13.657000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000643680 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:48:13.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:48:13.856360 kubelet[1758]: I0508 00:48:13.856308 1758 apiserver.go:52] "Watching apiserver" May 8 00:48:13.868235 kubelet[1758]: I0508 00:48:13.868199 1758 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:48:14.272488 systemd[1]: Reloading. May 8 00:48:14.380396 /usr/lib/systemd/system-generators/torcx-generator[2079]: time="2025-05-08T00:48:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:48:14.380437 /usr/lib/systemd/system-generators/torcx-generator[2079]: time="2025-05-08T00:48:14Z" level=info msg="torcx already run" May 8 00:48:14.521658 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:48:14.521678 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:48:14.539219 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:48:14.619312 kernel: kauditd_printk_skb: 363 callbacks suppressed May 8 00:48:14.619532 kernel: audit: type=1400 audit(1746665294.610:555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.619606 kernel: audit: type=1400 audit(1746665294.610:556): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.628259 kernel: audit: type=1400 audit(1746665294.610:557): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.628330 kernel: audit: type=1400 audit(1746665294.610:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.628370 kernel: audit: type=1400 audit(1746665294.610:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.632172 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 8 00:48:14.632242 kernel: audit: type=1400 audit(1746665294.610:560): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.633265 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 May 8 00:48:14.633320 kernel: audit: backlog limit exceeded May 8 00:48:14.633344 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 8 00:48:14.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.615000 audit: BPF prog-id=79 op=LOAD May 8 00:48:14.615000 audit: BPF prog-id=40 op=UNLOAD May 8 00:48:14.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit: BPF prog-id=80 op=LOAD May 8 00:48:14.618000 audit: BPF prog-id=41 op=UNLOAD May 8 00:48:14.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit: BPF prog-id=81 op=LOAD May 8 00:48:14.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.618000 audit: BPF prog-id=82 op=LOAD May 8 00:48:14.618000 audit: BPF prog-id=42 op=UNLOAD May 8 00:48:14.618000 audit: BPF prog-id=43 op=UNLOAD May 8 00:48:14.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.623000 audit: BPF prog-id=83 op=LOAD May 8 00:48:14.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.627000 audit: BPF prog-id=84 op=LOAD May 8 00:48:14.627000 audit: BPF prog-id=44 op=UNLOAD May 8 00:48:14.627000 audit: BPF prog-id=45 op=UNLOAD May 8 00:48:14.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit: BPF prog-id=85 op=LOAD May 8 00:48:14.641000 audit: BPF prog-id=57 op=UNLOAD May 8 00:48:14.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.641000 audit: BPF prog-id=86 op=LOAD May 8 00:48:14.641000 audit: BPF prog-id=60 op=UNLOAD May 8 00:48:14.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit: BPF prog-id=87 op=LOAD May 8 00:48:14.642000 audit: BPF prog-id=67 op=UNLOAD May 8 00:48:14.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.643000 audit: BPF prog-id=88 op=LOAD May 8 00:48:14.643000 audit: BPF prog-id=46 op=UNLOAD May 8 00:48:14.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.644000 audit: BPF prog-id=89 op=LOAD May 8 00:48:14.644000 audit: BPF prog-id=55 op=UNLOAD May 8 00:48:14.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.646000 audit: BPF prog-id=90 op=LOAD May 8 00:48:14.646000 audit: BPF prog-id=47 op=UNLOAD May 8 00:48:14.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit: BPF prog-id=91 op=LOAD May 8 00:48:14.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.647000 audit: BPF prog-id=92 op=LOAD May 8 00:48:14.647000 audit: BPF prog-id=48 op=UNLOAD May 8 00:48:14.647000 audit: BPF prog-id=49 op=UNLOAD May 8 00:48:14.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.651000 audit: BPF prog-id=93 op=LOAD May 8 00:48:14.651000 audit: BPF prog-id=75 op=UNLOAD May 8 00:48:14.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.652000 audit: BPF prog-id=94 op=LOAD May 8 00:48:14.652000 audit: BPF prog-id=50 op=UNLOAD May 8 00:48:14.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.653000 audit: BPF prog-id=95 op=LOAD May 8 00:48:14.653000 audit: BPF prog-id=51 op=UNLOAD May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit: BPF prog-id=96 op=LOAD May 8 00:48:14.654000 audit: BPF prog-id=52 op=UNLOAD May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit: BPF prog-id=97 op=LOAD May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.655000 audit: BPF prog-id=98 op=LOAD May 8 00:48:14.655000 audit: BPF prog-id=53 op=UNLOAD May 8 00:48:14.655000 audit: BPF prog-id=54 op=UNLOAD May 8 00:48:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.656000 audit: BPF prog-id=99 op=LOAD May 8 00:48:14.656000 audit: BPF prog-id=71 op=UNLOAD May 8 00:48:14.669473 systemd[1]: Stopping kubelet.service... May 8 00:48:14.692111 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:48:14.692351 systemd[1]: Stopped kubelet.service. May 8 00:48:14.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:14.694239 systemd[1]: Starting kubelet.service... May 8 00:48:14.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:14.783600 systemd[1]: Started kubelet.service. May 8 00:48:14.835011 kubelet[2105]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:48:14.835011 kubelet[2105]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 8 00:48:14.835011 kubelet[2105]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:48:14.835011 kubelet[2105]: I0508 00:48:14.829572 2105 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:48:14.835966 kubelet[2105]: I0508 00:48:14.835229 2105 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 8 00:48:14.835966 kubelet[2105]: I0508 00:48:14.835250 2105 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:48:14.835966 kubelet[2105]: I0508 00:48:14.835442 2105 server.go:927] "Client rotation is on, will bootstrap in background" May 8 00:48:14.836676 kubelet[2105]: I0508 00:48:14.836625 2105 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 8 00:48:14.840147 kubelet[2105]: I0508 00:48:14.840115 2105 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:48:14.848427 kubelet[2105]: I0508 00:48:14.848359 2105 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:48:14.848671 kubelet[2105]: I0508 00:48:14.848610 2105 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:48:14.848865 kubelet[2105]: I0508 00:48:14.848662 2105 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 8 00:48:14.849174 kubelet[2105]: I0508 00:48:14.848879 2105 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:48:14.849174 kubelet[2105]: I0508 00:48:14.848891 2105 container_manager_linux.go:301] "Creating device plugin manager" May 8 00:48:14.849174 kubelet[2105]: I0508 00:48:14.848950 2105 state_mem.go:36] "Initialized new in-memory state store" May 8 00:48:14.849803 kubelet[2105]: I0508 00:48:14.849760 2105 kubelet.go:400] "Attempting to sync node with API server" May 8 00:48:14.849803 kubelet[2105]: I0508 00:48:14.849789 2105 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:48:14.849803 kubelet[2105]: I0508 00:48:14.849813 2105 kubelet.go:312] "Adding apiserver pod source" May 8 00:48:14.850038 kubelet[2105]: I0508 00:48:14.849832 2105 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:48:14.850772 kubelet[2105]: I0508 00:48:14.850754 2105 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:48:14.851029 kubelet[2105]: I0508 00:48:14.851007 2105 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:48:14.851477 kubelet[2105]: I0508 00:48:14.851458 2105 server.go:1264] "Started kubelet" May 8 00:48:14.853000 audit[2105]: AVC avc: denied { mac_admin } for pid=2105 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.853000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:48:14.853000 audit[2105]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5c660 a1=c000587800 a2=c000b5c630 a3=25 items=0 ppid=1 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:14.853000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:48:14.854088 kubelet[2105]: I0508 00:48:14.854011 2105 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:48:14.854189 kubelet[2105]: I0508 00:48:14.854166 2105 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:48:14.853000 audit[2105]: AVC avc: denied { mac_admin } for pid=2105 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.853000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:48:14.853000 audit[2105]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00052fee0 a1=c000587818 a2=c000b5c6f0 a3=25 items=0 ppid=1 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:14.854480 kubelet[2105]: I0508 00:48:14.854430 2105 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:48:14.854480 kubelet[2105]: I0508 00:48:14.854464 2105 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:48:14.853000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:48:14.855473 kubelet[2105]: I0508 00:48:14.854668 2105 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 8 00:48:14.855598 kubelet[2105]: I0508 00:48:14.855585 2105 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:48:14.858918 kubelet[2105]: I0508 00:48:14.858899 2105 volume_manager.go:291] "Starting Kubelet Volume Manager" May 8 00:48:14.860111 kubelet[2105]: I0508 00:48:14.860078 2105 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:48:14.860454 kubelet[2105]: I0508 00:48:14.860428 2105 reconciler.go:26] "Reconciler: start to sync state" May 8 00:48:14.862457 kubelet[2105]: I0508 00:48:14.862425 2105 server.go:455] "Adding debug handlers to kubelet server" May 8 00:48:14.863748 kubelet[2105]: I0508 00:48:14.863717 2105 factory.go:221] Registration of the systemd container factory successfully May 8 00:48:14.863872 kubelet[2105]: I0508 00:48:14.863843 2105 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:48:14.869233 kubelet[2105]: E0508 00:48:14.869086 2105 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:48:14.869233 kubelet[2105]: I0508 00:48:14.869266 2105 factory.go:221] Registration of the containerd container factory successfully May 8 00:48:14.889745 kubelet[2105]: I0508 00:48:14.889623 2105 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:48:14.892125 kubelet[2105]: I0508 00:48:14.892100 2105 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:48:14.892125 kubelet[2105]: I0508 00:48:14.892125 2105 status_manager.go:217] "Starting to sync pod status with apiserver" May 8 00:48:14.892233 kubelet[2105]: I0508 00:48:14.892141 2105 kubelet.go:2337] "Starting kubelet main sync loop" May 8 00:48:14.892233 kubelet[2105]: E0508 00:48:14.892183 2105 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:48:14.905976 kubelet[2105]: I0508 00:48:14.905910 2105 cpu_manager.go:214] "Starting CPU manager" policy="none" May 8 00:48:14.906257 kubelet[2105]: I0508 00:48:14.906236 2105 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 8 00:48:14.906426 kubelet[2105]: I0508 00:48:14.906409 2105 state_mem.go:36] "Initialized new in-memory state store" May 8 00:48:14.906897 kubelet[2105]: I0508 00:48:14.906880 2105 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 8 00:48:14.907001 kubelet[2105]: I0508 00:48:14.906967 2105 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 8 00:48:14.907091 kubelet[2105]: I0508 00:48:14.907074 2105 policy_none.go:49] "None policy: Start" May 8 00:48:14.907844 kubelet[2105]: I0508 00:48:14.907827 2105 memory_manager.go:170] "Starting memorymanager" policy="None" May 8 00:48:14.907918 kubelet[2105]: I0508 00:48:14.907854 2105 state_mem.go:35] "Initializing new in-memory state store" May 8 00:48:14.907973 kubelet[2105]: I0508 00:48:14.907961 2105 state_mem.go:75] "Updated machine memory state" May 8 00:48:14.912305 kubelet[2105]: I0508 00:48:14.912278 2105 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:48:14.911000 audit[2105]: AVC avc: denied { mac_admin } for pid=2105 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:14.911000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:48:14.911000 audit[2105]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001156390 a1=c001174258 a2=c001156360 a3=25 items=0 ppid=1 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:14.911000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:48:14.912621 kubelet[2105]: I0508 00:48:14.912500 2105 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:48:14.912737 kubelet[2105]: I0508 00:48:14.912693 2105 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:48:14.912944 kubelet[2105]: I0508 00:48:14.912908 2105 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:48:14.964762 kubelet[2105]: I0508 00:48:14.964727 2105 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 8 00:48:14.975089 kubelet[2105]: I0508 00:48:14.975016 2105 kubelet_node_status.go:112] "Node was previously registered" node="localhost" May 8 00:48:14.975314 kubelet[2105]: I0508 00:48:14.975171 2105 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 8 00:48:14.992852 kubelet[2105]: I0508 00:48:14.992787 2105 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 8 00:48:14.993421 kubelet[2105]: I0508 00:48:14.993376 2105 topology_manager.go:215] "Topology Admit Handler" podUID="d89a7e2a8e6c92e2487aa645685800d8" podNamespace="kube-system" podName="kube-apiserver-localhost" May 8 00:48:14.993769 kubelet[2105]: I0508 00:48:14.993484 2105 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 8 00:48:15.162709 kubelet[2105]: I0508 00:48:15.161262 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d89a7e2a8e6c92e2487aa645685800d8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d89a7e2a8e6c92e2487aa645685800d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:48:15.162709 kubelet[2105]: I0508 00:48:15.161326 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d89a7e2a8e6c92e2487aa645685800d8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d89a7e2a8e6c92e2487aa645685800d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:48:15.162709 kubelet[2105]: I0508 00:48:15.161362 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:48:15.162709 kubelet[2105]: I0508 00:48:15.161382 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 8 00:48:15.162709 kubelet[2105]: I0508 00:48:15.161409 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:48:15.163060 kubelet[2105]: I0508 00:48:15.161435 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:48:15.163060 kubelet[2105]: I0508 00:48:15.161460 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:48:15.163060 kubelet[2105]: I0508 00:48:15.161539 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:48:15.163060 kubelet[2105]: I0508 00:48:15.161602 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d89a7e2a8e6c92e2487aa645685800d8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d89a7e2a8e6c92e2487aa645685800d8\") " pod="kube-system/kube-apiserver-localhost" May 8 00:48:15.309491 kubelet[2105]: E0508 00:48:15.309435 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:15.309667 kubelet[2105]: E0508 00:48:15.309591 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:15.311375 kubelet[2105]: E0508 00:48:15.311347 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:15.850897 kubelet[2105]: I0508 00:48:15.850851 2105 apiserver.go:52] "Watching apiserver" May 8 00:48:15.860584 kubelet[2105]: I0508 00:48:15.860542 2105 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:48:15.902570 kubelet[2105]: E0508 00:48:15.901726 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:15.902570 kubelet[2105]: E0508 00:48:15.901810 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:15.902570 kubelet[2105]: E0508 00:48:15.901898 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:16.381529 kubelet[2105]: I0508 00:48:16.381452 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.381400095 podStartE2EDuration="1.381400095s" podCreationTimestamp="2025-05-08 00:48:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:48:16.157502195 +0000 UTC m=+1.370260235" watchObservedRunningTime="2025-05-08 00:48:16.381400095 +0000 UTC m=+1.594158125" May 8 00:48:16.401111 kubelet[2105]: I0508 00:48:16.401031 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.401009227 podStartE2EDuration="1.401009227s" podCreationTimestamp="2025-05-08 00:48:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:48:16.383348562 +0000 UTC m=+1.596106592" watchObservedRunningTime="2025-05-08 00:48:16.401009227 +0000 UTC m=+1.613767267" May 8 00:48:16.416179 kubelet[2105]: I0508 00:48:16.416085 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.416059838 podStartE2EDuration="1.416059838s" podCreationTimestamp="2025-05-08 00:48:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:48:16.401572196 +0000 UTC m=+1.614330237" watchObservedRunningTime="2025-05-08 00:48:16.416059838 +0000 UTC m=+1.628817878" May 8 00:48:16.903667 kubelet[2105]: E0508 00:48:16.903614 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:16.904997 kubelet[2105]: E0508 00:48:16.904974 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:21.190701 sudo[1361]: pam_unix(sudo:session): session closed for user root May 8 00:48:21.190000 audit[1361]: USER_END pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:48:21.196627 kernel: kauditd_printk_skb: 252 callbacks suppressed May 8 00:48:21.196715 kernel: audit: type=1106 audit(1746665301.190:802): pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:48:21.197078 sshd[1355]: pam_unix(sshd:session): session closed for user core May 8 00:48:21.199473 systemd[1]: sshd@8-10.0.0.87:22-10.0.0.1:44916.service: Deactivated successfully. May 8 00:48:21.200165 systemd[1]: session-9.scope: Deactivated successfully. May 8 00:48:21.200297 systemd[1]: session-9.scope: Consumed 5.520s CPU time. May 8 00:48:21.190000 audit[1361]: CRED_DISP pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:48:21.200886 systemd-logind[1192]: Session 9 logged out. Waiting for processes to exit. May 8 00:48:21.201582 systemd-logind[1192]: Removed session 9. May 8 00:48:21.204352 kernel: audit: type=1104 audit(1746665301.190:803): pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:48:21.204399 kernel: audit: type=1106 audit(1746665301.197:804): pid=1355 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:21.197000 audit[1355]: USER_END pid=1355 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:21.197000 audit[1355]: CRED_DISP pid=1355 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:21.212419 kernel: audit: type=1104 audit(1746665301.197:805): pid=1355 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:21.212464 kernel: audit: type=1131 audit(1746665301.199:806): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.87:22-10.0.0.1:44916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:21.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.87:22-10.0.0.1:44916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:22.064502 kubelet[2105]: E0508 00:48:22.064430 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:22.910757 kubelet[2105]: E0508 00:48:22.910719 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:24.005103 kubelet[2105]: E0508 00:48:24.005041 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:24.915236 kubelet[2105]: E0508 00:48:24.915167 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:25.916397 kubelet[2105]: E0508 00:48:25.916330 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:26.309000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:26.309000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a37200 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:48:26.319676 kernel: audit: type=1400 audit(1746665306.309:807): avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:26.319846 kernel: audit: type=1300 audit(1746665306.309:807): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a37200 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:48:26.319887 kernel: audit: type=1327 audit(1746665306.309:807): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:48:26.309000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:48:26.309000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:26.327853 kernel: audit: type=1400 audit(1746665306.309:808): avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:26.327984 kernel: audit: type=1300 audit(1746665306.309:808): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a37220 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:48:26.309000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a37220 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:48:26.332681 kernel: audit: type=1327 audit(1746665306.309:808): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:48:26.309000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:48:26.310000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:26.365705 kernel: audit: type=1400 audit(1746665306.310:809): avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:26.365794 kernel: audit: type=1300 audit(1746665306.310:809): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00167d220 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:48:26.310000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00167d220 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:48:26.310000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:48:26.374534 kernel: audit: type=1327 audit(1746665306.310:809): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:48:26.374590 kernel: audit: type=1400 audit(1746665306.310:810): avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:26.310000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:48:26.310000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001aa00c0 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:48:26.310000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:48:26.600922 kubelet[2105]: E0508 00:48:26.600781 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:26.979464 kubelet[2105]: I0508 00:48:26.979353 2105 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 8 00:48:26.979885 env[1211]: time="2025-05-08T00:48:26.979824381Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 8 00:48:26.980163 kubelet[2105]: I0508 00:48:26.980107 2105 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 8 00:48:27.554347 kubelet[2105]: I0508 00:48:27.554260 2105 topology_manager.go:215] "Topology Admit Handler" podUID="35a70279-1bea-4dbc-b866-f4b92c105f1f" podNamespace="kube-system" podName="kube-proxy-rv874" May 8 00:48:27.560372 systemd[1]: Created slice kubepods-besteffort-pod35a70279_1bea_4dbc_b866_f4b92c105f1f.slice. May 8 00:48:27.665986 kubelet[2105]: I0508 00:48:27.665920 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/35a70279-1bea-4dbc-b866-f4b92c105f1f-lib-modules\") pod \"kube-proxy-rv874\" (UID: \"35a70279-1bea-4dbc-b866-f4b92c105f1f\") " pod="kube-system/kube-proxy-rv874" May 8 00:48:27.665986 kubelet[2105]: I0508 00:48:27.665976 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/35a70279-1bea-4dbc-b866-f4b92c105f1f-kube-proxy\") pod \"kube-proxy-rv874\" (UID: \"35a70279-1bea-4dbc-b866-f4b92c105f1f\") " pod="kube-system/kube-proxy-rv874" May 8 00:48:27.666216 kubelet[2105]: I0508 00:48:27.666032 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/35a70279-1bea-4dbc-b866-f4b92c105f1f-xtables-lock\") pod \"kube-proxy-rv874\" (UID: \"35a70279-1bea-4dbc-b866-f4b92c105f1f\") " pod="kube-system/kube-proxy-rv874" May 8 00:48:27.666216 kubelet[2105]: I0508 00:48:27.666056 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cv9xx\" (UniqueName: \"kubernetes.io/projected/35a70279-1bea-4dbc-b866-f4b92c105f1f-kube-api-access-cv9xx\") pod \"kube-proxy-rv874\" (UID: \"35a70279-1bea-4dbc-b866-f4b92c105f1f\") " pod="kube-system/kube-proxy-rv874" May 8 00:48:27.871213 kubelet[2105]: E0508 00:48:27.871068 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:27.871845 env[1211]: time="2025-05-08T00:48:27.871795938Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rv874,Uid:35a70279-1bea-4dbc-b866-f4b92c105f1f,Namespace:kube-system,Attempt:0,}" May 8 00:48:28.353254 env[1211]: time="2025-05-08T00:48:28.353148060Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:48:28.353254 env[1211]: time="2025-05-08T00:48:28.353208934Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:48:28.353254 env[1211]: time="2025-05-08T00:48:28.353222840Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:48:28.353723 env[1211]: time="2025-05-08T00:48:28.353420582Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5cd8e32392d9b5ecea77406ac6725a8bb30311647fbb21848c2f785cd1f18ad8 pid=2199 runtime=io.containerd.runc.v2 May 8 00:48:28.369020 systemd[1]: Started cri-containerd-5cd8e32392d9b5ecea77406ac6725a8bb30311647fbb21848c2f785cd1f18ad8.scope. May 8 00:48:28.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit: BPF prog-id=100 op=LOAD May 8 00:48:28.379000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2199 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:28.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563643865333233393264396235656365613737343036616336373235 May 8 00:48:28.379000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2199 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:28.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563643865333233393264396235656365613737343036616336373235 May 8 00:48:28.379000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.379000 audit: BPF prog-id=101 op=LOAD May 8 00:48:28.379000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003c47f0 items=0 ppid=2199 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:28.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563643865333233393264396235656365613737343036616336373235 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit: BPF prog-id=102 op=LOAD May 8 00:48:28.380000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003c4838 items=0 ppid=2199 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:28.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563643865333233393264396235656365613737343036616336373235 May 8 00:48:28.380000 audit: BPF prog-id=102 op=UNLOAD May 8 00:48:28.380000 audit: BPF prog-id=101 op=UNLOAD May 8 00:48:28.380000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:28.380000 audit: BPF prog-id=103 op=LOAD May 8 00:48:28.380000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c4c48 items=0 ppid=2199 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:28.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563643865333233393264396235656365613737343036616336373235 May 8 00:48:28.392834 env[1211]: time="2025-05-08T00:48:28.392774461Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rv874,Uid:35a70279-1bea-4dbc-b866-f4b92c105f1f,Namespace:kube-system,Attempt:0,} returns sandbox id \"5cd8e32392d9b5ecea77406ac6725a8bb30311647fbb21848c2f785cd1f18ad8\"" May 8 00:48:28.393615 kubelet[2105]: E0508 00:48:28.393586 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:28.395720 env[1211]: time="2025-05-08T00:48:28.395679489Z" level=info msg="CreateContainer within sandbox \"5cd8e32392d9b5ecea77406ac6725a8bb30311647fbb21848c2f785cd1f18ad8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 8 00:48:29.465578 env[1211]: time="2025-05-08T00:48:29.465479554Z" level=info msg="CreateContainer within sandbox \"5cd8e32392d9b5ecea77406ac6725a8bb30311647fbb21848c2f785cd1f18ad8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"194f6109b3137c71ef537fd6737afed12adf56e40715b8b83f4dd57ee3179f2a\"" May 8 00:48:29.466458 env[1211]: time="2025-05-08T00:48:29.466377381Z" level=info msg="StartContainer for \"194f6109b3137c71ef537fd6737afed12adf56e40715b8b83f4dd57ee3179f2a\"" May 8 00:48:29.485507 systemd[1]: Started cri-containerd-194f6109b3137c71ef537fd6737afed12adf56e40715b8b83f4dd57ee3179f2a.scope. May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fefe016b2e8 items=0 ppid=2199 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139346636313039623331333763373165663533376664363733376166 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit: BPF prog-id=104 op=LOAD May 8 00:48:29.503000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003b4548 items=0 ppid=2199 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139346636313039623331333763373165663533376664363733376166 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit: BPF prog-id=105 op=LOAD May 8 00:48:29.503000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003b4598 items=0 ppid=2199 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139346636313039623331333763373165663533376664363733376166 May 8 00:48:29.503000 audit: BPF prog-id=105 op=UNLOAD May 8 00:48:29.503000 audit: BPF prog-id=104 op=UNLOAD May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.503000 audit: BPF prog-id=106 op=LOAD May 8 00:48:29.503000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003b4628 items=0 ppid=2199 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139346636313039623331333763373165663533376664363733376166 May 8 00:48:29.526426 kubelet[2105]: I0508 00:48:29.525730 2105 topology_manager.go:215] "Topology Admit Handler" podUID="cf4a9382-3b26-462f-8b3b-1543807a6b41" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-67z7z" May 8 00:48:29.531748 systemd[1]: Created slice kubepods-besteffort-podcf4a9382_3b26_462f_8b3b_1543807a6b41.slice. May 8 00:48:29.635335 env[1211]: time="2025-05-08T00:48:29.635225981Z" level=info msg="StartContainer for \"194f6109b3137c71ef537fd6737afed12adf56e40715b8b83f4dd57ee3179f2a\" returns successfully" May 8 00:48:29.670000 audit[2293]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.670000 audit[2292]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.670000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe40140800 a2=0 a3=35c23f43c7db3080 items=0 ppid=2250 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:48:29.670000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd21bad50 a2=0 a3=7ffcd21bad3c items=0 ppid=2250 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:48:29.672000 audit[2294]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.672000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd01f0a110 a2=0 a3=7ffd01f0a0fc items=0 ppid=2250 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.672000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:48:29.673000 audit[2295]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.673000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd19d8d7b0 a2=0 a3=7ffd19d8d79c items=0 ppid=2250 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:48:29.673000 audit[2296]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.673000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcabb180b0 a2=0 a3=7ffcabb1809c items=0 ppid=2250 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:48:29.674000 audit[2297]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.674000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe32d3b0b0 a2=0 a3=7ffe32d3b09c items=0 ppid=2250 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:48:29.677828 kubelet[2105]: I0508 00:48:29.677784 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gqp8j\" (UniqueName: \"kubernetes.io/projected/cf4a9382-3b26-462f-8b3b-1543807a6b41-kube-api-access-gqp8j\") pod \"tigera-operator-797db67f8-67z7z\" (UID: \"cf4a9382-3b26-462f-8b3b-1543807a6b41\") " pod="tigera-operator/tigera-operator-797db67f8-67z7z" May 8 00:48:29.677828 kubelet[2105]: I0508 00:48:29.677831 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cf4a9382-3b26-462f-8b3b-1543807a6b41-var-lib-calico\") pod \"tigera-operator-797db67f8-67z7z\" (UID: \"cf4a9382-3b26-462f-8b3b-1543807a6b41\") " pod="tigera-operator/tigera-operator-797db67f8-67z7z" May 8 00:48:29.773000 audit[2298]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.773000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdd52795c0 a2=0 a3=7ffdd52795ac items=0 ppid=2250 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:48:29.775000 audit[2300]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.775000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff0aecc900 a2=0 a3=7fff0aecc8ec items=0 ppid=2250 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 8 00:48:29.779000 audit[2303]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.779000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd1ec303f0 a2=0 a3=7ffd1ec303dc items=0 ppid=2250 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 8 00:48:29.780000 audit[2304]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.780000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa4bf5a70 a2=0 a3=7fffa4bf5a5c items=0 ppid=2250 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.780000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:48:29.783000 audit[2306]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.783000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdbf5a35c0 a2=0 a3=7ffdbf5a35ac items=0 ppid=2250 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.783000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:48:29.784000 audit[2307]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.784000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc959e2a40 a2=0 a3=7ffc959e2a2c items=0 ppid=2250 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.784000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:48:29.787000 audit[2310]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.787000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe2e4d6cf0 a2=0 a3=7ffe2e4d6cdc items=0 ppid=2250 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:48:29.790000 audit[2313]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.790000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe76e20100 a2=0 a3=7ffe76e200ec items=0 ppid=2250 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 8 00:48:29.791000 audit[2314]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.791000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda3a0cdb0 a2=0 a3=7ffda3a0cd9c items=0 ppid=2250 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.791000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:48:29.793000 audit[2316]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.793000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdea494f30 a2=0 a3=7ffdea494f1c items=0 ppid=2250 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:48:29.794000 audit[2317]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.794000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9f00ec20 a2=0 a3=7ffe9f00ec0c items=0 ppid=2250 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:48:29.797000 audit[2319]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.797000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe7f154a0 a2=0 a3=7fffe7f1548c items=0 ppid=2250 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:48:29.800000 audit[2322]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.800000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd85ed14c0 a2=0 a3=7ffd85ed14ac items=0 ppid=2250 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:48:29.804000 audit[2325]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.804000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc53869650 a2=0 a3=7ffc5386963c items=0 ppid=2250 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.804000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:48:29.805000 audit[2326]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.805000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff218d3ab0 a2=0 a3=7fff218d3a9c items=0 ppid=2250 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:48:29.807000 audit[2328]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.807000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe27fee1c0 a2=0 a3=7ffe27fee1ac items=0 ppid=2250 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.807000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:48:29.810000 audit[2331]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.810000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffc9a51950 a2=0 a3=7fffc9a5193c items=0 ppid=2250 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.810000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:48:29.811000 audit[2332]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.811000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe26b4650 a2=0 a3=7fffe26b463c items=0 ppid=2250 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:48:29.813000 audit[2334]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:48:29.813000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe5c2fa260 a2=0 a3=7ffe5c2fa24c items=0 ppid=2250 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.813000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:48:29.835124 env[1211]: time="2025-05-08T00:48:29.834954513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-67z7z,Uid:cf4a9382-3b26-462f-8b3b-1543807a6b41,Namespace:tigera-operator,Attempt:0,}" May 8 00:48:29.834000 audit[2340]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:48:29.834000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe546413e0 a2=0 a3=7ffe546413cc items=0 ppid=2250 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.834000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:29.844000 audit[2340]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:48:29.844000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe546413e0 a2=0 a3=7ffe546413cc items=0 ppid=2250 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.844000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:29.846000 audit[2346]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.846000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcf0cd2960 a2=0 a3=7ffcf0cd294c items=0 ppid=2250 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:48:29.852353 env[1211]: time="2025-05-08T00:48:29.852251869Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:48:29.852537 env[1211]: time="2025-05-08T00:48:29.852364530Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:48:29.852537 env[1211]: time="2025-05-08T00:48:29.852387543Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:48:29.852747 env[1211]: time="2025-05-08T00:48:29.852642242Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7a726467729bc1caec92c6cc3c54862943d827bddecf91d433d2a001681eb16 pid=2354 runtime=io.containerd.runc.v2 May 8 00:48:29.853000 audit[2365]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.853000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffde0317ea0 a2=0 a3=7ffde0317e8c items=0 ppid=2250 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 8 00:48:29.857000 audit[2376]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.857000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd771bf800 a2=0 a3=7ffd771bf7ec items=0 ppid=2250 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 8 00:48:29.867776 systemd[1]: Started cri-containerd-f7a726467729bc1caec92c6cc3c54862943d827bddecf91d433d2a001681eb16.scope. May 8 00:48:29.867000 audit[2377]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.867000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd909e6890 a2=0 a3=7ffd909e687c items=0 ppid=2250 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.867000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:48:29.871000 audit[2383]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.871000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc673f4490 a2=0 a3=7ffc673f447c items=0 ppid=2250 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:48:29.874000 audit[2389]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.874000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb65b0c90 a2=0 a3=7ffcb65b0c7c items=0 ppid=2250 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.874000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:48:29.877000 audit[2391]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.877000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee2ef0c10 a2=0 a3=7ffee2ef0bfc items=0 ppid=2250 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 8 00:48:29.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.879000 audit: BPF prog-id=107 op=LOAD May 8 00:48:29.879000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.879000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2354 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613732363436373732396263316361656339326336636333633534 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2354 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613732363436373732396263316361656339326336636333633534 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit: BPF prog-id=108 op=LOAD May 8 00:48:29.880000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0003de000 items=0 ppid=2354 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613732363436373732396263316361656339326336636333633534 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit: BPF prog-id=109 op=LOAD May 8 00:48:29.880000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0003de048 items=0 ppid=2354 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613732363436373732396263316361656339326336636333633534 May 8 00:48:29.880000 audit: BPF prog-id=109 op=UNLOAD May 8 00:48:29.880000 audit: BPF prog-id=108 op=UNLOAD May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:29.880000 audit: BPF prog-id=110 op=LOAD May 8 00:48:29.880000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0003de458 items=0 ppid=2354 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613732363436373732396263316361656339326336636333633534 May 8 00:48:29.881000 audit[2394]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.881000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc22e93e50 a2=0 a3=7ffc22e93e3c items=0 ppid=2250 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:48:29.883000 audit[2395]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.883000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff901fa530 a2=0 a3=7fff901fa51c items=0 ppid=2250 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:48:29.885000 audit[2397]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.885000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2c609930 a2=0 a3=7ffe2c60991c items=0 ppid=2250 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.885000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:48:29.886000 audit[2398]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.886000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1ff7a6c0 a2=0 a3=7ffe1ff7a6ac items=0 ppid=2250 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:48:29.889000 audit[2400]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.889000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7134bde0 a2=0 a3=7ffe7134bdcc items=0 ppid=2250 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:48:29.892000 audit[2403]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.892000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd5103bd0 a2=0 a3=7fffd5103bbc items=0 ppid=2250 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.892000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:48:29.896000 audit[2406]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.896000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1e324c70 a2=0 a3=7ffe1e324c5c items=0 ppid=2250 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.896000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 8 00:48:29.897000 audit[2407]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.897000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe28a16b50 a2=0 a3=7ffe28a16b3c items=0 ppid=2250 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:48:29.899000 audit[2409]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.899000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc56cce5b0 a2=0 a3=7ffc56cce59c items=0 ppid=2250 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:48:29.903000 audit[2412]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.903000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe325ceec0 a2=0 a3=7ffe325ceeac items=0 ppid=2250 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:48:29.904000 audit[2413]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.904000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff455c00b0 a2=0 a3=7fff455c009c items=0 ppid=2250 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:48:29.907000 audit[2421]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.907000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd989e8fa0 a2=0 a3=7ffd989e8f8c items=0 ppid=2250 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:48:29.909000 audit[2422]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.909000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea56d0040 a2=0 a3=7ffea56d002c items=0 ppid=2250 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:48:29.912000 audit[2424]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.912000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc5e833aa0 a2=0 a3=7ffc5e833a8c items=0 ppid=2250 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:48:29.914204 env[1211]: time="2025-05-08T00:48:29.914148778Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-67z7z,Uid:cf4a9382-3b26-462f-8b3b-1543807a6b41,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"f7a726467729bc1caec92c6cc3c54862943d827bddecf91d433d2a001681eb16\"" May 8 00:48:29.915000 audit[2427]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:48:29.915000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd72578b80 a2=0 a3=7ffd72578b6c items=0 ppid=2250 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:48:29.917744 env[1211]: time="2025-05-08T00:48:29.917692286Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 8 00:48:29.918000 audit[2429]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:48:29.918000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff4905d900 a2=0 a3=7fff4905d8ec items=0 ppid=2250 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.918000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:29.918000 audit[2429]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:48:29.918000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff4905d900 a2=0 a3=7fff4905d8ec items=0 ppid=2250 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:29.918000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:29.922926 kubelet[2105]: E0508 00:48:29.922890 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:29.932728 kubelet[2105]: I0508 00:48:29.932619 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-rv874" podStartSLOduration=2.932563343 podStartE2EDuration="2.932563343s" podCreationTimestamp="2025-05-08 00:48:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:48:29.932392992 +0000 UTC m=+15.145151032" watchObservedRunningTime="2025-05-08 00:48:29.932563343 +0000 UTC m=+15.145321383" May 8 00:48:30.925847 kubelet[2105]: E0508 00:48:30.925811 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:33.504832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2466710719.mount: Deactivated successfully. May 8 00:48:34.171511 env[1211]: time="2025-05-08T00:48:34.171304861Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:34.173846 env[1211]: time="2025-05-08T00:48:34.173806779Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:34.175400 env[1211]: time="2025-05-08T00:48:34.175349064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:34.176947 env[1211]: time="2025-05-08T00:48:34.176915425Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:34.177429 env[1211]: time="2025-05-08T00:48:34.177397581Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 8 00:48:34.180037 env[1211]: time="2025-05-08T00:48:34.180003685Z" level=info msg="CreateContainer within sandbox \"f7a726467729bc1caec92c6cc3c54862943d827bddecf91d433d2a001681eb16\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 8 00:48:34.194782 env[1211]: time="2025-05-08T00:48:34.194732513Z" level=info msg="CreateContainer within sandbox \"f7a726467729bc1caec92c6cc3c54862943d827bddecf91d433d2a001681eb16\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"33e7d5b2a7e75f2594c69c1234e988f8e0abe2049fdb325f4e113675423657d8\"" May 8 00:48:34.195229 env[1211]: time="2025-05-08T00:48:34.195206193Z" level=info msg="StartContainer for \"33e7d5b2a7e75f2594c69c1234e988f8e0abe2049fdb325f4e113675423657d8\"" May 8 00:48:34.212827 systemd[1]: Started cri-containerd-33e7d5b2a7e75f2594c69c1234e988f8e0abe2049fdb325f4e113675423657d8.scope. May 8 00:48:34.229695 kernel: kauditd_printk_skb: 312 callbacks suppressed May 8 00:48:34.229848 kernel: audit: type=1400 audit(1746665314.224:904): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229888 kernel: audit: type=1400 audit(1746665314.224:905): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.235468 kernel: audit: type=1400 audit(1746665314.224:906): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.235526 kernel: audit: type=1400 audit(1746665314.224:907): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.241561 kernel: audit: type=1400 audit(1746665314.224:908): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.241613 kernel: audit: type=1400 audit(1746665314.224:909): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.244475 kernel: audit: type=1400 audit(1746665314.224:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.250390 kernel: audit: type=1400 audit(1746665314.224:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.250430 kernel: audit: type=1400 audit(1746665314.224:912): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.256183 kernel: audit: type=1400 audit(1746665314.228:913): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.228000 audit: BPF prog-id=111 op=LOAD May 8 00:48:34.229000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2354 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:34.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333653764356232613765373566323539346336396331323334653938 May 8 00:48:34.229000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2354 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:34.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333653764356232613765373566323539346336396331323334653938 May 8 00:48:34.229000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.229000 audit: BPF prog-id=112 op=LOAD May 8 00:48:34.229000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a09d0 items=0 ppid=2354 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:34.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333653764356232613765373566323539346336396331323334653938 May 8 00:48:34.234000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.234000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.234000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.234000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.234000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.234000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.234000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.234000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.234000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.234000 audit: BPF prog-id=113 op=LOAD May 8 00:48:34.234000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a0a18 items=0 ppid=2354 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:34.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333653764356232613765373566323539346336396331323334653938 May 8 00:48:34.243000 audit: BPF prog-id=113 op=UNLOAD May 8 00:48:34.243000 audit: BPF prog-id=112 op=UNLOAD May 8 00:48:34.243000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.243000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.243000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.243000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.243000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.243000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.243000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.243000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.243000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.243000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:34.243000 audit: BPF prog-id=114 op=LOAD May 8 00:48:34.243000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a0e28 items=0 ppid=2354 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:34.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333653764356232613765373566323539346336396331323334653938 May 8 00:48:34.308286 env[1211]: time="2025-05-08T00:48:34.308226834Z" level=info msg="StartContainer for \"33e7d5b2a7e75f2594c69c1234e988f8e0abe2049fdb325f4e113675423657d8\" returns successfully" May 8 00:48:34.942127 kubelet[2105]: I0508 00:48:34.942028 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-67z7z" podStartSLOduration=2.6791626429999997 podStartE2EDuration="6.94200453s" podCreationTimestamp="2025-05-08 00:48:28 +0000 UTC" firstStartedPulling="2025-05-08 00:48:29.91546963 +0000 UTC m=+15.128227670" lastFinishedPulling="2025-05-08 00:48:34.178311507 +0000 UTC m=+19.391069557" observedRunningTime="2025-05-08 00:48:34.941932535 +0000 UTC m=+20.154690595" watchObservedRunningTime="2025-05-08 00:48:34.94200453 +0000 UTC m=+20.154762570" May 8 00:48:37.096000 audit[2471]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:48:37.096000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff429e89a0 a2=0 a3=7fff429e898c items=0 ppid=2250 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:37.096000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:37.104000 audit[2471]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:48:37.104000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff429e89a0 a2=0 a3=0 items=0 ppid=2250 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:37.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:37.127000 audit[2473]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=2473 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:48:37.127000 audit[2473]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd1feb26b0 a2=0 a3=7ffd1feb269c items=0 ppid=2250 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:37.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:37.133000 audit[2473]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2473 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:48:37.133000 audit[2473]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd1feb26b0 a2=0 a3=0 items=0 ppid=2250 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:37.133000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:37.218247 kubelet[2105]: I0508 00:48:37.218188 2105 topology_manager.go:215] "Topology Admit Handler" podUID="84378012-bfb1-4a9d-a6b8-056d1e2508c8" podNamespace="calico-system" podName="calico-typha-8d9c7ffcd-pl9rh" May 8 00:48:37.224599 systemd[1]: Created slice kubepods-besteffort-pod84378012_bfb1_4a9d_a6b8_056d1e2508c8.slice. May 8 00:48:37.272799 kubelet[2105]: I0508 00:48:37.272731 2105 topology_manager.go:215] "Topology Admit Handler" podUID="0262449d-3d63-49df-be65-af026ee8e41d" podNamespace="calico-system" podName="calico-node-6x8qw" May 8 00:48:37.275362 kubelet[2105]: W0508 00:48:37.275327 2105 reflector.go:547] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object May 8 00:48:37.275575 kubelet[2105]: E0508 00:48:37.275554 2105 reflector.go:150] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object May 8 00:48:37.275777 kubelet[2105]: W0508 00:48:37.275757 2105 reflector.go:547] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object May 8 00:48:37.275878 kubelet[2105]: E0508 00:48:37.275859 2105 reflector.go:150] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object May 8 00:48:37.279790 systemd[1]: Created slice kubepods-besteffort-pod0262449d_3d63_49df_be65_af026ee8e41d.slice. May 8 00:48:37.329253 kubelet[2105]: I0508 00:48:37.329186 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/84378012-bfb1-4a9d-a6b8-056d1e2508c8-typha-certs\") pod \"calico-typha-8d9c7ffcd-pl9rh\" (UID: \"84378012-bfb1-4a9d-a6b8-056d1e2508c8\") " pod="calico-system/calico-typha-8d9c7ffcd-pl9rh" May 8 00:48:37.329253 kubelet[2105]: I0508 00:48:37.329246 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qlhrq\" (UniqueName: \"kubernetes.io/projected/84378012-bfb1-4a9d-a6b8-056d1e2508c8-kube-api-access-qlhrq\") pod \"calico-typha-8d9c7ffcd-pl9rh\" (UID: \"84378012-bfb1-4a9d-a6b8-056d1e2508c8\") " pod="calico-system/calico-typha-8d9c7ffcd-pl9rh" May 8 00:48:37.329500 kubelet[2105]: I0508 00:48:37.329274 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/84378012-bfb1-4a9d-a6b8-056d1e2508c8-tigera-ca-bundle\") pod \"calico-typha-8d9c7ffcd-pl9rh\" (UID: \"84378012-bfb1-4a9d-a6b8-056d1e2508c8\") " pod="calico-system/calico-typha-8d9c7ffcd-pl9rh" May 8 00:48:37.389085 kubelet[2105]: I0508 00:48:37.388920 2105 topology_manager.go:215] "Topology Admit Handler" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" podNamespace="calico-system" podName="csi-node-driver-k7qpk" May 8 00:48:37.390537 kubelet[2105]: E0508 00:48:37.390502 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:48:37.429995 kubelet[2105]: I0508 00:48:37.429931 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0262449d-3d63-49df-be65-af026ee8e41d-var-run-calico\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.429995 kubelet[2105]: I0508 00:48:37.429974 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4lwsp\" (UniqueName: \"kubernetes.io/projected/0262449d-3d63-49df-be65-af026ee8e41d-kube-api-access-4lwsp\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.430237 kubelet[2105]: I0508 00:48:37.430021 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0262449d-3d63-49df-be65-af026ee8e41d-cni-bin-dir\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.430237 kubelet[2105]: I0508 00:48:37.430035 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0262449d-3d63-49df-be65-af026ee8e41d-cni-log-dir\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.430237 kubelet[2105]: I0508 00:48:37.430062 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0262449d-3d63-49df-be65-af026ee8e41d-lib-modules\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.430237 kubelet[2105]: I0508 00:48:37.430076 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0262449d-3d63-49df-be65-af026ee8e41d-cni-net-dir\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.430237 kubelet[2105]: I0508 00:48:37.430092 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0262449d-3d63-49df-be65-af026ee8e41d-xtables-lock\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.430418 kubelet[2105]: I0508 00:48:37.430107 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0262449d-3d63-49df-be65-af026ee8e41d-policysync\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.430418 kubelet[2105]: I0508 00:48:37.430119 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0262449d-3d63-49df-be65-af026ee8e41d-node-certs\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.430418 kubelet[2105]: I0508 00:48:37.430145 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0262449d-3d63-49df-be65-af026ee8e41d-tigera-ca-bundle\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.430418 kubelet[2105]: I0508 00:48:37.430170 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0262449d-3d63-49df-be65-af026ee8e41d-var-lib-calico\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.430418 kubelet[2105]: I0508 00:48:37.430183 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0262449d-3d63-49df-be65-af026ee8e41d-flexvol-driver-host\") pod \"calico-node-6x8qw\" (UID: \"0262449d-3d63-49df-be65-af026ee8e41d\") " pod="calico-system/calico-node-6x8qw" May 8 00:48:37.528229 kubelet[2105]: E0508 00:48:37.528152 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:37.528788 env[1211]: time="2025-05-08T00:48:37.528737306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8d9c7ffcd-pl9rh,Uid:84378012-bfb1-4a9d-a6b8-056d1e2508c8,Namespace:calico-system,Attempt:0,}" May 8 00:48:37.531021 kubelet[2105]: I0508 00:48:37.530978 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/95af3a69-e90f-40a0-a3a8-e84fbf9772e8-kubelet-dir\") pod \"csi-node-driver-k7qpk\" (UID: \"95af3a69-e90f-40a0-a3a8-e84fbf9772e8\") " pod="calico-system/csi-node-driver-k7qpk" May 8 00:48:37.531111 kubelet[2105]: I0508 00:48:37.531031 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/95af3a69-e90f-40a0-a3a8-e84fbf9772e8-socket-dir\") pod \"csi-node-driver-k7qpk\" (UID: \"95af3a69-e90f-40a0-a3a8-e84fbf9772e8\") " pod="calico-system/csi-node-driver-k7qpk" May 8 00:48:37.531111 kubelet[2105]: I0508 00:48:37.531052 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b8gzg\" (UniqueName: \"kubernetes.io/projected/95af3a69-e90f-40a0-a3a8-e84fbf9772e8-kube-api-access-b8gzg\") pod \"csi-node-driver-k7qpk\" (UID: \"95af3a69-e90f-40a0-a3a8-e84fbf9772e8\") " pod="calico-system/csi-node-driver-k7qpk" May 8 00:48:37.531111 kubelet[2105]: I0508 00:48:37.531108 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/95af3a69-e90f-40a0-a3a8-e84fbf9772e8-varrun\") pod \"csi-node-driver-k7qpk\" (UID: \"95af3a69-e90f-40a0-a3a8-e84fbf9772e8\") " pod="calico-system/csi-node-driver-k7qpk" May 8 00:48:37.531223 kubelet[2105]: I0508 00:48:37.531162 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/95af3a69-e90f-40a0-a3a8-e84fbf9772e8-registration-dir\") pod \"csi-node-driver-k7qpk\" (UID: \"95af3a69-e90f-40a0-a3a8-e84fbf9772e8\") " pod="calico-system/csi-node-driver-k7qpk" May 8 00:48:37.533140 kubelet[2105]: E0508 00:48:37.533107 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.533140 kubelet[2105]: W0508 00:48:37.533135 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.533292 kubelet[2105]: E0508 00:48:37.533157 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.543873 kubelet[2105]: E0508 00:48:37.543819 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.543873 kubelet[2105]: W0508 00:48:37.543862 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.543873 kubelet[2105]: E0508 00:48:37.543894 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.549411 env[1211]: time="2025-05-08T00:48:37.549341388Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:48:37.549604 env[1211]: time="2025-05-08T00:48:37.549379450Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:48:37.549604 env[1211]: time="2025-05-08T00:48:37.549389158Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:48:37.549604 env[1211]: time="2025-05-08T00:48:37.549498334Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/434260119c7a66d0dd3c3b2f662a089ed1ac3f46a653f3c7790ce608649f00ec pid=2486 runtime=io.containerd.runc.v2 May 8 00:48:37.564154 systemd[1]: Started cri-containerd-434260119c7a66d0dd3c3b2f662a089ed1ac3f46a653f3c7790ce608649f00ec.scope. May 8 00:48:37.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.580000 audit: BPF prog-id=115 op=LOAD May 8 00:48:37.581000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.581000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2486 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:37.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433343236303131396337613636643064643363336232663636326130 May 8 00:48:37.581000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.581000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2486 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:37.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433343236303131396337613636643064643363336232663636326130 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit: BPF prog-id=116 op=LOAD May 8 00:48:37.582000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021f4a0 items=0 ppid=2486 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:37.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433343236303131396337613636643064643363336232663636326130 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.582000 audit: BPF prog-id=117 op=LOAD May 8 00:48:37.582000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021f4e8 items=0 ppid=2486 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:37.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433343236303131396337613636643064643363336232663636326130 May 8 00:48:37.582000 audit: BPF prog-id=117 op=UNLOAD May 8 00:48:37.583000 audit: BPF prog-id=116 op=UNLOAD May 8 00:48:37.583000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.583000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.583000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.583000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.583000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.583000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.583000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.583000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.583000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.583000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:37.583000 audit: BPF prog-id=118 op=LOAD May 8 00:48:37.583000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021f8f8 items=0 ppid=2486 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:37.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433343236303131396337613636643064643363336232663636326130 May 8 00:48:37.615711 env[1211]: time="2025-05-08T00:48:37.615668133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8d9c7ffcd-pl9rh,Uid:84378012-bfb1-4a9d-a6b8-056d1e2508c8,Namespace:calico-system,Attempt:0,} returns sandbox id \"434260119c7a66d0dd3c3b2f662a089ed1ac3f46a653f3c7790ce608649f00ec\"" May 8 00:48:37.618114 kubelet[2105]: E0508 00:48:37.617418 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:37.620854 env[1211]: time="2025-05-08T00:48:37.620830115Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 8 00:48:37.631883 kubelet[2105]: E0508 00:48:37.631839 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.631883 kubelet[2105]: W0508 00:48:37.631866 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.632007 kubelet[2105]: E0508 00:48:37.631896 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.632198 kubelet[2105]: E0508 00:48:37.632173 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.632198 kubelet[2105]: W0508 00:48:37.632183 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.632198 kubelet[2105]: E0508 00:48:37.632191 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.632404 kubelet[2105]: E0508 00:48:37.632376 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.632404 kubelet[2105]: W0508 00:48:37.632390 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.632404 kubelet[2105]: E0508 00:48:37.632406 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.632701 kubelet[2105]: E0508 00:48:37.632548 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.632701 kubelet[2105]: W0508 00:48:37.632558 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.632701 kubelet[2105]: E0508 00:48:37.632566 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.632856 kubelet[2105]: E0508 00:48:37.632834 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.632856 kubelet[2105]: W0508 00:48:37.632851 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.632944 kubelet[2105]: E0508 00:48:37.632871 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.633134 kubelet[2105]: E0508 00:48:37.633119 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.633134 kubelet[2105]: W0508 00:48:37.633131 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.633190 kubelet[2105]: E0508 00:48:37.633144 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.633384 kubelet[2105]: E0508 00:48:37.633365 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.633466 kubelet[2105]: W0508 00:48:37.633379 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.633466 kubelet[2105]: E0508 00:48:37.633408 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.633713 kubelet[2105]: E0508 00:48:37.633693 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.633713 kubelet[2105]: W0508 00:48:37.633707 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.633800 kubelet[2105]: E0508 00:48:37.633719 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.633896 kubelet[2105]: E0508 00:48:37.633881 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.633896 kubelet[2105]: W0508 00:48:37.633891 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.633969 kubelet[2105]: E0508 00:48:37.633936 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.634054 kubelet[2105]: E0508 00:48:37.634043 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.634054 kubelet[2105]: W0508 00:48:37.634053 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.634105 kubelet[2105]: E0508 00:48:37.634075 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.634205 kubelet[2105]: E0508 00:48:37.634194 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.634205 kubelet[2105]: W0508 00:48:37.634203 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.634272 kubelet[2105]: E0508 00:48:37.634224 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.634394 kubelet[2105]: E0508 00:48:37.634376 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.634394 kubelet[2105]: W0508 00:48:37.634389 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.634476 kubelet[2105]: E0508 00:48:37.634402 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.634638 kubelet[2105]: E0508 00:48:37.634610 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.634638 kubelet[2105]: W0508 00:48:37.634624 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.634638 kubelet[2105]: E0508 00:48:37.634641 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.634893 kubelet[2105]: E0508 00:48:37.634862 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.634893 kubelet[2105]: W0508 00:48:37.634870 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.634946 kubelet[2105]: E0508 00:48:37.634896 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.635084 kubelet[2105]: E0508 00:48:37.635070 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.635084 kubelet[2105]: W0508 00:48:37.635080 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.635158 kubelet[2105]: E0508 00:48:37.635094 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.635287 kubelet[2105]: E0508 00:48:37.635262 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.635287 kubelet[2105]: W0508 00:48:37.635272 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.635365 kubelet[2105]: E0508 00:48:37.635296 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.635446 kubelet[2105]: E0508 00:48:37.635432 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.635446 kubelet[2105]: W0508 00:48:37.635441 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.635536 kubelet[2105]: E0508 00:48:37.635471 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.635735 kubelet[2105]: E0508 00:48:37.635718 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.635735 kubelet[2105]: W0508 00:48:37.635732 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.635853 kubelet[2105]: E0508 00:48:37.635776 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.635948 kubelet[2105]: E0508 00:48:37.635934 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.635948 kubelet[2105]: W0508 00:48:37.635944 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.636040 kubelet[2105]: E0508 00:48:37.635979 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.636158 kubelet[2105]: E0508 00:48:37.636130 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.636158 kubelet[2105]: W0508 00:48:37.636143 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.636158 kubelet[2105]: E0508 00:48:37.636157 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.636370 kubelet[2105]: E0508 00:48:37.636329 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.636370 kubelet[2105]: W0508 00:48:37.636339 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.636370 kubelet[2105]: E0508 00:48:37.636352 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.636551 kubelet[2105]: E0508 00:48:37.636536 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.636551 kubelet[2105]: W0508 00:48:37.636547 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.636641 kubelet[2105]: E0508 00:48:37.636563 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.636801 kubelet[2105]: E0508 00:48:37.636768 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.636801 kubelet[2105]: W0508 00:48:37.636780 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.636801 kubelet[2105]: E0508 00:48:37.636795 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.637046 kubelet[2105]: E0508 00:48:37.637031 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.637046 kubelet[2105]: W0508 00:48:37.637042 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.637155 kubelet[2105]: E0508 00:48:37.637053 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.637261 kubelet[2105]: E0508 00:48:37.637249 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.637261 kubelet[2105]: W0508 00:48:37.637259 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.637315 kubelet[2105]: E0508 00:48:37.637267 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.645965 kubelet[2105]: E0508 00:48:37.645838 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.645965 kubelet[2105]: W0508 00:48:37.645890 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.645965 kubelet[2105]: E0508 00:48:37.645913 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.646486 kubelet[2105]: E0508 00:48:37.646470 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.646486 kubelet[2105]: W0508 00:48:37.646484 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.646585 kubelet[2105]: E0508 00:48:37.646493 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.736134 kubelet[2105]: E0508 00:48:37.736058 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.736134 kubelet[2105]: W0508 00:48:37.736104 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.736134 kubelet[2105]: E0508 00:48:37.736139 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.837009 kubelet[2105]: E0508 00:48:37.836933 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.837009 kubelet[2105]: W0508 00:48:37.836976 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.837009 kubelet[2105]: E0508 00:48:37.837002 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:37.938907 kubelet[2105]: E0508 00:48:37.938618 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:37.939289 kubelet[2105]: W0508 00:48:37.939237 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:37.939625 kubelet[2105]: E0508 00:48:37.939477 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:38.041411 kubelet[2105]: E0508 00:48:38.041345 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:38.041411 kubelet[2105]: W0508 00:48:38.041396 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:38.041786 kubelet[2105]: E0508 00:48:38.041436 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:38.146247 kubelet[2105]: E0508 00:48:38.144423 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:38.146247 kubelet[2105]: W0508 00:48:38.144480 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:38.146247 kubelet[2105]: E0508 00:48:38.144514 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:38.155000 audit[2553]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=2553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:48:38.155000 audit[2553]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffe8a63cde0 a2=0 a3=7ffe8a63cdcc items=0 ppid=2250 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:38.155000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:38.160000 audit[2553]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:48:38.160000 audit[2553]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe8a63cde0 a2=0 a3=0 items=0 ppid=2250 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:38.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:38.246459 kubelet[2105]: E0508 00:48:38.246275 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:38.246459 kubelet[2105]: W0508 00:48:38.246301 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:38.246459 kubelet[2105]: E0508 00:48:38.246340 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:38.331226 kubelet[2105]: E0508 00:48:38.331153 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:38.331226 kubelet[2105]: W0508 00:48:38.331194 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:38.331226 kubelet[2105]: E0508 00:48:38.331225 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:38.483308 kubelet[2105]: E0508 00:48:38.483240 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:38.484056 env[1211]: time="2025-05-08T00:48:38.484009612Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6x8qw,Uid:0262449d-3d63-49df-be65-af026ee8e41d,Namespace:calico-system,Attempt:0,}" May 8 00:48:38.510418 env[1211]: time="2025-05-08T00:48:38.510321939Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:48:38.510418 env[1211]: time="2025-05-08T00:48:38.510386110Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:48:38.510908 env[1211]: time="2025-05-08T00:48:38.510404514Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:48:38.511166 env[1211]: time="2025-05-08T00:48:38.511105881Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/76b8acd8f2168ffc51131ad24a48c5717e89cf356f2175b4c261ad4b4bd64c26 pid=2563 runtime=io.containerd.runc.v2 May 8 00:48:38.531055 systemd[1]: Started cri-containerd-76b8acd8f2168ffc51131ad24a48c5717e89cf356f2175b4c261ad4b4bd64c26.scope. May 8 00:48:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.545000 audit: BPF prog-id=119 op=LOAD May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2563 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:38.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623861636438663231363866666335313133316164323461343863 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2563 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:38.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623861636438663231363866666335313133316164323461343863 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit: BPF prog-id=120 op=LOAD May 8 00:48:38.546000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002d7ce0 items=0 ppid=2563 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:38.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623861636438663231363866666335313133316164323461343863 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit: BPF prog-id=121 op=LOAD May 8 00:48:38.546000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002d7d28 items=0 ppid=2563 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:38.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623861636438663231363866666335313133316164323461343863 May 8 00:48:38.546000 audit: BPF prog-id=121 op=UNLOAD May 8 00:48:38.546000 audit: BPF prog-id=120 op=UNLOAD May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:38.546000 audit: BPF prog-id=122 op=LOAD May 8 00:48:38.546000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c0138 items=0 ppid=2563 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:38.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623861636438663231363866666335313133316164323461343863 May 8 00:48:38.562871 env[1211]: time="2025-05-08T00:48:38.562771745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6x8qw,Uid:0262449d-3d63-49df-be65-af026ee8e41d,Namespace:calico-system,Attempt:0,} returns sandbox id \"76b8acd8f2168ffc51131ad24a48c5717e89cf356f2175b4c261ad4b4bd64c26\"" May 8 00:48:38.563683 kubelet[2105]: E0508 00:48:38.563621 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:38.893521 kubelet[2105]: E0508 00:48:38.893320 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:48:40.892999 kubelet[2105]: E0508 00:48:40.892929 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:48:41.163827 env[1211]: time="2025-05-08T00:48:41.163678432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:41.165730 env[1211]: time="2025-05-08T00:48:41.165687534Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:41.167361 env[1211]: time="2025-05-08T00:48:41.167327492Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:41.168887 env[1211]: time="2025-05-08T00:48:41.168864086Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:41.169288 env[1211]: time="2025-05-08T00:48:41.169256072Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 8 00:48:41.170404 env[1211]: time="2025-05-08T00:48:41.170375162Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 8 00:48:41.177526 env[1211]: time="2025-05-08T00:48:41.177481191Z" level=info msg="CreateContainer within sandbox \"434260119c7a66d0dd3c3b2f662a089ed1ac3f46a653f3c7790ce608649f00ec\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 8 00:48:41.195330 env[1211]: time="2025-05-08T00:48:41.195268329Z" level=info msg="CreateContainer within sandbox \"434260119c7a66d0dd3c3b2f662a089ed1ac3f46a653f3c7790ce608649f00ec\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"fb6bdd468828e13d75cf871fa7f2f8e5f4bbbfb1b1ae26dcc5029ea4d2b364e7\"" May 8 00:48:41.195885 env[1211]: time="2025-05-08T00:48:41.195836925Z" level=info msg="StartContainer for \"fb6bdd468828e13d75cf871fa7f2f8e5f4bbbfb1b1ae26dcc5029ea4d2b364e7\"" May 8 00:48:41.214745 systemd[1]: Started cri-containerd-fb6bdd468828e13d75cf871fa7f2f8e5f4bbbfb1b1ae26dcc5029ea4d2b364e7.scope. May 8 00:48:41.235967 kernel: kauditd_printk_skb: 179 callbacks suppressed May 8 00:48:41.236130 kernel: audit: type=1400 audit(1746665321.230:964): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.236167 kernel: audit: type=1400 audit(1746665321.230:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.242347 kernel: audit: type=1400 audit(1746665321.230:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.245942 kernel: audit: type=1400 audit(1746665321.230:967): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.249316 kernel: audit: type=1400 audit(1746665321.230:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.249426 kernel: audit: type=1400 audit(1746665321.230:969): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.256077 kernel: audit: type=1400 audit(1746665321.230:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.256276 kernel: audit: type=1400 audit(1746665321.230:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.259397 kernel: audit: type=1400 audit(1746665321.230:972): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.266141 kernel: audit: type=1400 audit(1746665321.234:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.234000 audit: BPF prog-id=123 op=LOAD May 8 00:48:41.235000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2486 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:41.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366264643436383832386531336437356366383731666137663266 May 8 00:48:41.235000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2486 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:41.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366264643436383832386531336437356366383731666137663266 May 8 00:48:41.235000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.235000 audit: BPF prog-id=124 op=LOAD May 8 00:48:41.235000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b1f30 items=0 ppid=2486 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:41.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366264643436383832386531336437356366383731666137663266 May 8 00:48:41.238000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.238000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.238000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.238000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.238000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.238000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.238000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.238000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.238000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.238000 audit: BPF prog-id=125 op=LOAD May 8 00:48:41.238000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b1f78 items=0 ppid=2486 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:41.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366264643436383832386531336437356366383731666137663266 May 8 00:48:41.241000 audit: BPF prog-id=125 op=UNLOAD May 8 00:48:41.241000 audit: BPF prog-id=124 op=UNLOAD May 8 00:48:41.241000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.241000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.241000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.241000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.241000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.241000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.241000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.241000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.241000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.241000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:41.241000 audit: BPF prog-id=126 op=LOAD May 8 00:48:41.241000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000422388 items=0 ppid=2486 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:41.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366264643436383832386531336437356366383731666137663266 May 8 00:48:41.286610 env[1211]: time="2025-05-08T00:48:41.286547113Z" level=info msg="StartContainer for \"fb6bdd468828e13d75cf871fa7f2f8e5f4bbbfb1b1ae26dcc5029ea4d2b364e7\" returns successfully" May 8 00:48:41.953607 kubelet[2105]: E0508 00:48:41.953545 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:41.964875 kubelet[2105]: I0508 00:48:41.964523 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-8d9c7ffcd-pl9rh" podStartSLOduration=1.413608799 podStartE2EDuration="4.964503742s" podCreationTimestamp="2025-05-08 00:48:37 +0000 UTC" firstStartedPulling="2025-05-08 00:48:37.619302546 +0000 UTC m=+22.832060586" lastFinishedPulling="2025-05-08 00:48:41.170197489 +0000 UTC m=+26.382955529" observedRunningTime="2025-05-08 00:48:41.963847359 +0000 UTC m=+27.176605399" watchObservedRunningTime="2025-05-08 00:48:41.964503742 +0000 UTC m=+27.177261812" May 8 00:48:41.993888 kubelet[2105]: E0508 00:48:41.993779 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.993888 kubelet[2105]: W0508 00:48:41.993811 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.993888 kubelet[2105]: E0508 00:48:41.993834 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.994144 kubelet[2105]: E0508 00:48:41.994053 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.994144 kubelet[2105]: W0508 00:48:41.994065 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.994144 kubelet[2105]: E0508 00:48:41.994076 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.994289 kubelet[2105]: E0508 00:48:41.994274 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.994289 kubelet[2105]: W0508 00:48:41.994286 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.994371 kubelet[2105]: E0508 00:48:41.994296 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.994456 kubelet[2105]: E0508 00:48:41.994436 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.994456 kubelet[2105]: W0508 00:48:41.994447 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.994532 kubelet[2105]: E0508 00:48:41.994458 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.994612 kubelet[2105]: E0508 00:48:41.994599 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.994612 kubelet[2105]: W0508 00:48:41.994609 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.994703 kubelet[2105]: E0508 00:48:41.994617 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.994889 kubelet[2105]: E0508 00:48:41.994867 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.994889 kubelet[2105]: W0508 00:48:41.994879 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.994889 kubelet[2105]: E0508 00:48:41.994887 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.995044 kubelet[2105]: E0508 00:48:41.995033 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.995044 kubelet[2105]: W0508 00:48:41.995043 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.995115 kubelet[2105]: E0508 00:48:41.995050 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.995212 kubelet[2105]: E0508 00:48:41.995200 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.995212 kubelet[2105]: W0508 00:48:41.995210 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.995279 kubelet[2105]: E0508 00:48:41.995218 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.995366 kubelet[2105]: E0508 00:48:41.995355 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.995366 kubelet[2105]: W0508 00:48:41.995365 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.995437 kubelet[2105]: E0508 00:48:41.995372 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.995539 kubelet[2105]: E0508 00:48:41.995527 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.995539 kubelet[2105]: W0508 00:48:41.995537 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.995614 kubelet[2105]: E0508 00:48:41.995545 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.995723 kubelet[2105]: E0508 00:48:41.995710 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.995723 kubelet[2105]: W0508 00:48:41.995720 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.995812 kubelet[2105]: E0508 00:48:41.995728 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.995900 kubelet[2105]: E0508 00:48:41.995888 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.995900 kubelet[2105]: W0508 00:48:41.995898 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.995968 kubelet[2105]: E0508 00:48:41.995906 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.996052 kubelet[2105]: E0508 00:48:41.996040 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.996052 kubelet[2105]: W0508 00:48:41.996049 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.996120 kubelet[2105]: E0508 00:48:41.996056 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.996220 kubelet[2105]: E0508 00:48:41.996209 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.996220 kubelet[2105]: W0508 00:48:41.996218 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.996284 kubelet[2105]: E0508 00:48:41.996226 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:41.996347 kubelet[2105]: E0508 00:48:41.996338 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:41.996377 kubelet[2105]: W0508 00:48:41.996348 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:41.996377 kubelet[2105]: E0508 00:48:41.996355 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.074932 kubelet[2105]: E0508 00:48:42.074859 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.074932 kubelet[2105]: W0508 00:48:42.074895 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.074932 kubelet[2105]: E0508 00:48:42.074919 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.075273 kubelet[2105]: E0508 00:48:42.075248 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.075273 kubelet[2105]: W0508 00:48:42.075264 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.075457 kubelet[2105]: E0508 00:48:42.075282 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.075731 kubelet[2105]: E0508 00:48:42.075563 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.075731 kubelet[2105]: W0508 00:48:42.075593 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.075731 kubelet[2105]: E0508 00:48:42.075616 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.076030 kubelet[2105]: E0508 00:48:42.076003 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.076069 kubelet[2105]: W0508 00:48:42.076036 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.076097 kubelet[2105]: E0508 00:48:42.076072 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.076367 kubelet[2105]: E0508 00:48:42.076338 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.076367 kubelet[2105]: W0508 00:48:42.076356 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.076444 kubelet[2105]: E0508 00:48:42.076375 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.076612 kubelet[2105]: E0508 00:48:42.076586 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.076612 kubelet[2105]: W0508 00:48:42.076602 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.076687 kubelet[2105]: E0508 00:48:42.076617 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.076856 kubelet[2105]: E0508 00:48:42.076836 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.076856 kubelet[2105]: W0508 00:48:42.076847 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.076910 kubelet[2105]: E0508 00:48:42.076859 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.077056 kubelet[2105]: E0508 00:48:42.077041 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.077056 kubelet[2105]: W0508 00:48:42.077051 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.077154 kubelet[2105]: E0508 00:48:42.077076 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.077241 kubelet[2105]: E0508 00:48:42.077224 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.077241 kubelet[2105]: W0508 00:48:42.077239 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.077334 kubelet[2105]: E0508 00:48:42.077284 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.077425 kubelet[2105]: E0508 00:48:42.077406 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.077425 kubelet[2105]: W0508 00:48:42.077422 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.077514 kubelet[2105]: E0508 00:48:42.077439 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.077680 kubelet[2105]: E0508 00:48:42.077663 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.077680 kubelet[2105]: W0508 00:48:42.077676 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.077752 kubelet[2105]: E0508 00:48:42.077691 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.077939 kubelet[2105]: E0508 00:48:42.077920 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.077939 kubelet[2105]: W0508 00:48:42.077938 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.078018 kubelet[2105]: E0508 00:48:42.077956 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.078289 kubelet[2105]: E0508 00:48:42.078271 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.078289 kubelet[2105]: W0508 00:48:42.078287 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.078364 kubelet[2105]: E0508 00:48:42.078304 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.078526 kubelet[2105]: E0508 00:48:42.078509 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.078526 kubelet[2105]: W0508 00:48:42.078523 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.078609 kubelet[2105]: E0508 00:48:42.078539 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.078877 kubelet[2105]: E0508 00:48:42.078844 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.078877 kubelet[2105]: W0508 00:48:42.078859 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.078877 kubelet[2105]: E0508 00:48:42.078879 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.079254 kubelet[2105]: E0508 00:48:42.079237 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.079254 kubelet[2105]: W0508 00:48:42.079248 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.079342 kubelet[2105]: E0508 00:48:42.079262 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.079452 kubelet[2105]: E0508 00:48:42.079439 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.079452 kubelet[2105]: W0508 00:48:42.079447 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.079569 kubelet[2105]: E0508 00:48:42.079459 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.079620 kubelet[2105]: E0508 00:48:42.079607 2105 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:48:42.079620 kubelet[2105]: W0508 00:48:42.079615 2105 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:48:42.079620 kubelet[2105]: E0508 00:48:42.079622 2105 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:48:42.648521 env[1211]: time="2025-05-08T00:48:42.648452943Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:42.650895 env[1211]: time="2025-05-08T00:48:42.650841466Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:42.653833 env[1211]: time="2025-05-08T00:48:42.653801002Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:42.655986 env[1211]: time="2025-05-08T00:48:42.655925289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:42.656514 env[1211]: time="2025-05-08T00:48:42.656465693Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 8 00:48:42.659537 env[1211]: time="2025-05-08T00:48:42.659481544Z" level=info msg="CreateContainer within sandbox \"76b8acd8f2168ffc51131ad24a48c5717e89cf356f2175b4c261ad4b4bd64c26\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 8 00:48:42.867108 env[1211]: time="2025-05-08T00:48:42.867036939Z" level=info msg="CreateContainer within sandbox \"76b8acd8f2168ffc51131ad24a48c5717e89cf356f2175b4c261ad4b4bd64c26\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8cce4363bff491265f765f3d67bbc7c69397458f7c588602527e3c3f6fb807ef\"" May 8 00:48:42.867472 env[1211]: time="2025-05-08T00:48:42.867411281Z" level=info msg="StartContainer for \"8cce4363bff491265f765f3d67bbc7c69397458f7c588602527e3c3f6fb807ef\"" May 8 00:48:42.886999 systemd[1]: Started cri-containerd-8cce4363bff491265f765f3d67bbc7c69397458f7c588602527e3c3f6fb807ef.scope. May 8 00:48:42.892696 kubelet[2105]: E0508 00:48:42.892631 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:48:42.902000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.902000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6bb4b77518 items=0 ppid=2563 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:42.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863636534333633626666343931323635663736356633643637626263 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit: BPF prog-id=127 op=LOAD May 8 00:48:42.903000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000275ba8 items=0 ppid=2563 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:42.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863636534333633626666343931323635663736356633643637626263 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit: BPF prog-id=128 op=LOAD May 8 00:48:42.903000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000275bf8 items=0 ppid=2563 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:42.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863636534333633626666343931323635663736356633643637626263 May 8 00:48:42.903000 audit: BPF prog-id=128 op=UNLOAD May 8 00:48:42.903000 audit: BPF prog-id=127 op=UNLOAD May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:42.903000 audit: BPF prog-id=129 op=LOAD May 8 00:48:42.903000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000275c88 items=0 ppid=2563 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:42.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863636534333633626666343931323635663736356633643637626263 May 8 00:48:42.931784 systemd[1]: cri-containerd-8cce4363bff491265f765f3d67bbc7c69397458f7c588602527e3c3f6fb807ef.scope: Deactivated successfully. May 8 00:48:42.936000 audit: BPF prog-id=129 op=UNLOAD May 8 00:48:43.054982 env[1211]: time="2025-05-08T00:48:43.054888425Z" level=info msg="StartContainer for \"8cce4363bff491265f765f3d67bbc7c69397458f7c588602527e3c3f6fb807ef\" returns successfully" May 8 00:48:43.057185 kubelet[2105]: I0508 00:48:43.057154 2105 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:48:43.057871 kubelet[2105]: E0508 00:48:43.057848 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:43.175053 systemd[1]: run-containerd-runc-k8s.io-8cce4363bff491265f765f3d67bbc7c69397458f7c588602527e3c3f6fb807ef-runc.nbKMLa.mount: Deactivated successfully. May 8 00:48:43.175144 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8cce4363bff491265f765f3d67bbc7c69397458f7c588602527e3c3f6fb807ef-rootfs.mount: Deactivated successfully. May 8 00:48:44.058965 env[1211]: time="2025-05-08T00:48:44.058890099Z" level=info msg="shim disconnected" id=8cce4363bff491265f765f3d67bbc7c69397458f7c588602527e3c3f6fb807ef May 8 00:48:44.058965 env[1211]: time="2025-05-08T00:48:44.058960802Z" level=warning msg="cleaning up after shim disconnected" id=8cce4363bff491265f765f3d67bbc7c69397458f7c588602527e3c3f6fb807ef namespace=k8s.io May 8 00:48:44.058965 env[1211]: time="2025-05-08T00:48:44.058972914Z" level=info msg="cleaning up dead shim" May 8 00:48:44.070809 kubelet[2105]: E0508 00:48:44.070737 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:44.072005 env[1211]: time="2025-05-08T00:48:44.071948648Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:48:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2724 runtime=io.containerd.runc.v2\n" May 8 00:48:44.724448 systemd[1]: Started sshd@9-10.0.0.87:22-10.0.0.1:54776.service. May 8 00:48:44.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.87:22-10.0.0.1:54776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:44.767000 audit[2739]: USER_ACCT pid=2739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:44.767912 sshd[2739]: Accepted publickey for core from 10.0.0.1 port 54776 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:48:44.768000 audit[2739]: CRED_ACQ pid=2739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:44.768000 audit[2739]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdea3f12a0 a2=3 a3=0 items=0 ppid=1 pid=2739 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:44.768000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:48:44.777192 sshd[2739]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:48:44.782943 systemd-logind[1192]: New session 10 of user core. May 8 00:48:44.783897 systemd[1]: Started session-10.scope. May 8 00:48:44.787000 audit[2739]: USER_START pid=2739 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:44.788000 audit[2741]: CRED_ACQ pid=2741 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:44.892895 kubelet[2105]: E0508 00:48:44.892811 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:48:44.968941 sshd[2739]: pam_unix(sshd:session): session closed for user core May 8 00:48:44.969000 audit[2739]: USER_END pid=2739 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:44.969000 audit[2739]: CRED_DISP pid=2739 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:44.971311 systemd[1]: sshd@9-10.0.0.87:22-10.0.0.1:54776.service: Deactivated successfully. May 8 00:48:44.972097 systemd[1]: session-10.scope: Deactivated successfully. May 8 00:48:44.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.87:22-10.0.0.1:54776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:44.972787 systemd-logind[1192]: Session 10 logged out. Waiting for processes to exit. May 8 00:48:44.973550 systemd-logind[1192]: Removed session 10. May 8 00:48:45.064729 kubelet[2105]: E0508 00:48:45.064673 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:45.065795 env[1211]: time="2025-05-08T00:48:45.065752769Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 8 00:48:46.893269 kubelet[2105]: E0508 00:48:46.893203 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:48:48.892798 kubelet[2105]: E0508 00:48:48.892718 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:48:49.973113 systemd[1]: Started sshd@10-10.0.0.87:22-10.0.0.1:39776.service. May 8 00:48:49.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.87:22-10.0.0.1:39776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:49.974412 kernel: kauditd_printk_skb: 102 callbacks suppressed May 8 00:48:49.975259 kernel: audit: type=1130 audit(1746665329.972:998): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.87:22-10.0.0.1:39776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:50.100000 audit[2755]: USER_ACCT pid=2755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.101747 sshd[2755]: Accepted publickey for core from 10.0.0.1 port 39776 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:48:50.105237 sshd[2755]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:48:50.104000 audit[2755]: CRED_ACQ pid=2755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.110479 systemd[1]: Started session-11.scope. May 8 00:48:50.112081 kernel: audit: type=1101 audit(1746665330.100:999): pid=2755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.112157 kernel: audit: type=1103 audit(1746665330.104:1000): pid=2755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.112197 kernel: audit: type=1006 audit(1746665330.104:1001): pid=2755 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 8 00:48:50.111720 systemd-logind[1192]: New session 11 of user core. May 8 00:48:50.104000 audit[2755]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb4f7c2e0 a2=3 a3=0 items=0 ppid=1 pid=2755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:50.120735 kernel: audit: type=1300 audit(1746665330.104:1001): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb4f7c2e0 a2=3 a3=0 items=0 ppid=1 pid=2755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:50.120836 kernel: audit: type=1327 audit(1746665330.104:1001): proctitle=737368643A20636F7265205B707269765D May 8 00:48:50.104000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:48:50.122523 kernel: audit: type=1105 audit(1746665330.118:1002): pid=2755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.118000 audit[2755]: USER_START pid=2755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.119000 audit[2757]: CRED_ACQ pid=2757 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.132618 kernel: audit: type=1103 audit(1746665330.119:1003): pid=2757 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.235170 sshd[2755]: pam_unix(sshd:session): session closed for user core May 8 00:48:50.235000 audit[2755]: USER_END pid=2755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.238136 systemd[1]: sshd@10-10.0.0.87:22-10.0.0.1:39776.service: Deactivated successfully. May 8 00:48:50.239032 systemd[1]: session-11.scope: Deactivated successfully. May 8 00:48:50.239772 systemd-logind[1192]: Session 11 logged out. Waiting for processes to exit. May 8 00:48:50.241111 systemd-logind[1192]: Removed session 11. May 8 00:48:50.235000 audit[2755]: CRED_DISP pid=2755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.246158 kernel: audit: type=1106 audit(1746665330.235:1004): pid=2755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.246241 kernel: audit: type=1104 audit(1746665330.235:1005): pid=2755 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:50.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.87:22-10.0.0.1:39776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:50.932076 kubelet[2105]: E0508 00:48:50.931984 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:48:52.710225 env[1211]: time="2025-05-08T00:48:52.710164308Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:52.713852 env[1211]: time="2025-05-08T00:48:52.713811053Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:52.716086 env[1211]: time="2025-05-08T00:48:52.716054779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:52.720251 env[1211]: time="2025-05-08T00:48:52.720206520Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:48:52.721007 env[1211]: time="2025-05-08T00:48:52.720941200Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 8 00:48:52.723593 env[1211]: time="2025-05-08T00:48:52.723527336Z" level=info msg="CreateContainer within sandbox \"76b8acd8f2168ffc51131ad24a48c5717e89cf356f2175b4c261ad4b4bd64c26\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 8 00:48:52.746193 env[1211]: time="2025-05-08T00:48:52.746126171Z" level=info msg="CreateContainer within sandbox \"76b8acd8f2168ffc51131ad24a48c5717e89cf356f2175b4c261ad4b4bd64c26\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"bea006506d0352084a833b7c6b875a240415e5adf85c33bad2b7343669af62a3\"" May 8 00:48:52.746781 env[1211]: time="2025-05-08T00:48:52.746755767Z" level=info msg="StartContainer for \"bea006506d0352084a833b7c6b875a240415e5adf85c33bad2b7343669af62a3\"" May 8 00:48:52.769901 systemd[1]: Started cri-containerd-bea006506d0352084a833b7c6b875a240415e5adf85c33bad2b7343669af62a3.scope. May 8 00:48:52.811000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb9dd055918 items=0 ppid=2563 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:52.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613030363530366430333532303834613833336237633662383735 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit: BPF prog-id=130 op=LOAD May 8 00:48:52.811000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002d9b98 items=0 ppid=2563 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:52.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613030363530366430333532303834613833336237633662383735 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.811000 audit: BPF prog-id=131 op=LOAD May 8 00:48:52.811000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002d9be8 items=0 ppid=2563 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:52.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613030363530366430333532303834613833336237633662383735 May 8 00:48:52.812000 audit: BPF prog-id=131 op=UNLOAD May 8 00:48:52.812000 audit: BPF prog-id=130 op=UNLOAD May 8 00:48:52.812000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.812000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.812000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.812000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.812000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.812000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.812000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.812000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.812000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.812000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:48:52.812000 audit: BPF prog-id=132 op=LOAD May 8 00:48:52.812000 audit[2775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002d9c78 items=0 ppid=2563 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:52.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613030363530366430333532303834613833336237633662383735 May 8 00:48:52.893248 kubelet[2105]: E0508 00:48:52.893185 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:48:53.078376 env[1211]: time="2025-05-08T00:48:53.078314645Z" level=info msg="StartContainer for \"bea006506d0352084a833b7c6b875a240415e5adf85c33bad2b7343669af62a3\" returns successfully" May 8 00:48:53.812265 kubelet[2105]: I0508 00:48:53.812220 2105 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:48:53.813060 kubelet[2105]: E0508 00:48:53.813020 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:54.083418 kubelet[2105]: E0508 00:48:54.083255 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:54.083918 kubelet[2105]: E0508 00:48:54.083424 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:54.152000 audit[2806]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:48:54.152000 audit[2806]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd448a5580 a2=0 a3=7ffd448a556c items=0 ppid=2250 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:54.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:54.157000 audit[2806]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:48:54.157000 audit[2806]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd448a5580 a2=0 a3=7ffd448a556c items=0 ppid=2250 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:54.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:48:54.326957 systemd[1]: cri-containerd-bea006506d0352084a833b7c6b875a240415e5adf85c33bad2b7343669af62a3.scope: Deactivated successfully. May 8 00:48:54.331000 audit: BPF prog-id=132 op=UNLOAD May 8 00:48:54.346241 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bea006506d0352084a833b7c6b875a240415e5adf85c33bad2b7343669af62a3-rootfs.mount: Deactivated successfully. May 8 00:48:54.347850 kubelet[2105]: I0508 00:48:54.346853 2105 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 8 00:48:54.494496 kubelet[2105]: I0508 00:48:54.494424 2105 topology_manager.go:215] "Topology Admit Handler" podUID="2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f" podNamespace="kube-system" podName="coredns-7db6d8ff4d-bq7kp" May 8 00:48:54.499069 systemd[1]: Created slice kubepods-burstable-pod2cdc3a94_9ecf_4d94_b57b_0f72cb67f85f.slice. May 8 00:48:54.514612 kubelet[2105]: I0508 00:48:54.514560 2105 topology_manager.go:215] "Topology Admit Handler" podUID="eece7c19-430f-4e6b-b277-95661b0e90ab" podNamespace="calico-apiserver" podName="calico-apiserver-59c4d76dbf-zzmgd" May 8 00:48:54.517279 kubelet[2105]: I0508 00:48:54.517241 2105 topology_manager.go:215] "Topology Admit Handler" podUID="a16f602c-d0cb-4c91-baa4-1387765ec4ad" podNamespace="kube-system" podName="coredns-7db6d8ff4d-7cxtw" May 8 00:48:54.519611 kubelet[2105]: I0508 00:48:54.519581 2105 topology_manager.go:215] "Topology Admit Handler" podUID="4fc668bb-3c8a-4b79-b500-98d947cbaed8" podNamespace="calico-apiserver" podName="calico-apiserver-59c4d76dbf-sk59c" May 8 00:48:54.520025 kubelet[2105]: I0508 00:48:54.519979 2105 topology_manager.go:215] "Topology Admit Handler" podUID="5bc60802-10c5-4081-acc4-1b877ddcbd86" podNamespace="calico-system" podName="calico-kube-controllers-6bfc598f-lfzp9" May 8 00:48:54.521315 systemd[1]: Created slice kubepods-besteffort-podeece7c19_430f_4e6b_b277_95661b0e90ab.slice. May 8 00:48:54.525349 systemd[1]: Created slice kubepods-burstable-poda16f602c_d0cb_4c91_baa4_1387765ec4ad.slice. May 8 00:48:54.529478 systemd[1]: Created slice kubepods-besteffort-pod4fc668bb_3c8a_4b79_b500_98d947cbaed8.slice. May 8 00:48:54.534094 systemd[1]: Created slice kubepods-besteffort-pod5bc60802_10c5_4081_acc4_1b877ddcbd86.slice. May 8 00:48:54.562626 kubelet[2105]: I0508 00:48:54.562595 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/eece7c19-430f-4e6b-b277-95661b0e90ab-calico-apiserver-certs\") pod \"calico-apiserver-59c4d76dbf-zzmgd\" (UID: \"eece7c19-430f-4e6b-b277-95661b0e90ab\") " pod="calico-apiserver/calico-apiserver-59c4d76dbf-zzmgd" May 8 00:48:54.562626 kubelet[2105]: I0508 00:48:54.562634 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xg4b2\" (UniqueName: \"kubernetes.io/projected/eece7c19-430f-4e6b-b277-95661b0e90ab-kube-api-access-xg4b2\") pod \"calico-apiserver-59c4d76dbf-zzmgd\" (UID: \"eece7c19-430f-4e6b-b277-95661b0e90ab\") " pod="calico-apiserver/calico-apiserver-59c4d76dbf-zzmgd" May 8 00:48:54.562810 kubelet[2105]: I0508 00:48:54.562675 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a16f602c-d0cb-4c91-baa4-1387765ec4ad-config-volume\") pod \"coredns-7db6d8ff4d-7cxtw\" (UID: \"a16f602c-d0cb-4c91-baa4-1387765ec4ad\") " pod="kube-system/coredns-7db6d8ff4d-7cxtw" May 8 00:48:54.562810 kubelet[2105]: I0508 00:48:54.562704 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4fc668bb-3c8a-4b79-b500-98d947cbaed8-calico-apiserver-certs\") pod \"calico-apiserver-59c4d76dbf-sk59c\" (UID: \"4fc668bb-3c8a-4b79-b500-98d947cbaed8\") " pod="calico-apiserver/calico-apiserver-59c4d76dbf-sk59c" May 8 00:48:54.562810 kubelet[2105]: I0508 00:48:54.562742 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h2mc9\" (UniqueName: \"kubernetes.io/projected/a16f602c-d0cb-4c91-baa4-1387765ec4ad-kube-api-access-h2mc9\") pod \"coredns-7db6d8ff4d-7cxtw\" (UID: \"a16f602c-d0cb-4c91-baa4-1387765ec4ad\") " pod="kube-system/coredns-7db6d8ff4d-7cxtw" May 8 00:48:54.562810 kubelet[2105]: I0508 00:48:54.562758 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f-config-volume\") pod \"coredns-7db6d8ff4d-bq7kp\" (UID: \"2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f\") " pod="kube-system/coredns-7db6d8ff4d-bq7kp" May 8 00:48:54.562810 kubelet[2105]: I0508 00:48:54.562775 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lkdpt\" (UniqueName: \"kubernetes.io/projected/5bc60802-10c5-4081-acc4-1b877ddcbd86-kube-api-access-lkdpt\") pod \"calico-kube-controllers-6bfc598f-lfzp9\" (UID: \"5bc60802-10c5-4081-acc4-1b877ddcbd86\") " pod="calico-system/calico-kube-controllers-6bfc598f-lfzp9" May 8 00:48:54.562942 kubelet[2105]: I0508 00:48:54.562806 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j6pnd\" (UniqueName: \"kubernetes.io/projected/2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f-kube-api-access-j6pnd\") pod \"coredns-7db6d8ff4d-bq7kp\" (UID: \"2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f\") " pod="kube-system/coredns-7db6d8ff4d-bq7kp" May 8 00:48:54.562942 kubelet[2105]: I0508 00:48:54.562822 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g2lzc\" (UniqueName: \"kubernetes.io/projected/4fc668bb-3c8a-4b79-b500-98d947cbaed8-kube-api-access-g2lzc\") pod \"calico-apiserver-59c4d76dbf-sk59c\" (UID: \"4fc668bb-3c8a-4b79-b500-98d947cbaed8\") " pod="calico-apiserver/calico-apiserver-59c4d76dbf-sk59c" May 8 00:48:54.562942 kubelet[2105]: I0508 00:48:54.562838 2105 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5bc60802-10c5-4081-acc4-1b877ddcbd86-tigera-ca-bundle\") pod \"calico-kube-controllers-6bfc598f-lfzp9\" (UID: \"5bc60802-10c5-4081-acc4-1b877ddcbd86\") " pod="calico-system/calico-kube-controllers-6bfc598f-lfzp9" May 8 00:48:54.742346 env[1211]: time="2025-05-08T00:48:54.742144680Z" level=info msg="shim disconnected" id=bea006506d0352084a833b7c6b875a240415e5adf85c33bad2b7343669af62a3 May 8 00:48:54.742346 env[1211]: time="2025-05-08T00:48:54.742211459Z" level=warning msg="cleaning up after shim disconnected" id=bea006506d0352084a833b7c6b875a240415e5adf85c33bad2b7343669af62a3 namespace=k8s.io May 8 00:48:54.742346 env[1211]: time="2025-05-08T00:48:54.742223813Z" level=info msg="cleaning up dead shim" May 8 00:48:54.750473 env[1211]: time="2025-05-08T00:48:54.750392941Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:48:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2821 runtime=io.containerd.runc.v2\n" May 8 00:48:54.901932 systemd[1]: Created slice kubepods-besteffort-pod95af3a69_e90f_40a0_a3a8_e84fbf9772e8.slice. May 8 00:48:54.904904 env[1211]: time="2025-05-08T00:48:54.904843479Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k7qpk,Uid:95af3a69-e90f-40a0-a3a8-e84fbf9772e8,Namespace:calico-system,Attempt:0,}" May 8 00:48:54.983015 env[1211]: time="2025-05-08T00:48:54.982900106Z" level=error msg="Failed to destroy network for sandbox \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:54.983481 env[1211]: time="2025-05-08T00:48:54.983435939Z" level=error msg="encountered an error cleaning up failed sandbox \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:54.983546 env[1211]: time="2025-05-08T00:48:54.983504141Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k7qpk,Uid:95af3a69-e90f-40a0-a3a8-e84fbf9772e8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:54.983937 kubelet[2105]: E0508 00:48:54.983856 2105 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:54.984019 kubelet[2105]: E0508 00:48:54.983964 2105 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k7qpk" May 8 00:48:54.984019 kubelet[2105]: E0508 00:48:54.983990 2105 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k7qpk" May 8 00:48:54.984081 kubelet[2105]: E0508 00:48:54.984048 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-k7qpk_calico-system(95af3a69-e90f-40a0-a3a8-e84fbf9772e8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-k7qpk_calico-system(95af3a69-e90f-40a0-a3a8-e84fbf9772e8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:48:55.087129 kubelet[2105]: E0508 00:48:55.087098 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:55.087677 kubelet[2105]: I0508 00:48:55.087628 2105 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" May 8 00:48:55.088238 env[1211]: time="2025-05-08T00:48:55.088206803Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 8 00:48:55.088463 env[1211]: time="2025-05-08T00:48:55.088401137Z" level=info msg="StopPodSandbox for \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\"" May 8 00:48:55.101800 kubelet[2105]: E0508 00:48:55.101740 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:55.102449 env[1211]: time="2025-05-08T00:48:55.102405652Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bq7kp,Uid:2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f,Namespace:kube-system,Attempt:0,}" May 8 00:48:55.116695 env[1211]: time="2025-05-08T00:48:55.116608810Z" level=error msg="StopPodSandbox for \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\" failed" error="failed to destroy network for sandbox \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.116974 kubelet[2105]: E0508 00:48:55.116916 2105 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" May 8 00:48:55.117052 kubelet[2105]: E0508 00:48:55.116992 2105 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7"} May 8 00:48:55.117099 kubelet[2105]: E0508 00:48:55.117066 2105 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"95af3a69-e90f-40a0-a3a8-e84fbf9772e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:48:55.117169 kubelet[2105]: E0508 00:48:55.117088 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"95af3a69-e90f-40a0-a3a8-e84fbf9772e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:48:55.124817 env[1211]: time="2025-05-08T00:48:55.124743050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59c4d76dbf-zzmgd,Uid:eece7c19-430f-4e6b-b277-95661b0e90ab,Namespace:calico-apiserver,Attempt:0,}" May 8 00:48:55.128253 kubelet[2105]: E0508 00:48:55.128213 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:48:55.128794 env[1211]: time="2025-05-08T00:48:55.128751307Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7cxtw,Uid:a16f602c-d0cb-4c91-baa4-1387765ec4ad,Namespace:kube-system,Attempt:0,}" May 8 00:48:55.132685 env[1211]: time="2025-05-08T00:48:55.132630865Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59c4d76dbf-sk59c,Uid:4fc668bb-3c8a-4b79-b500-98d947cbaed8,Namespace:calico-apiserver,Attempt:0,}" May 8 00:48:55.136559 env[1211]: time="2025-05-08T00:48:55.136518499Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bfc598f-lfzp9,Uid:5bc60802-10c5-4081-acc4-1b877ddcbd86,Namespace:calico-system,Attempt:0,}" May 8 00:48:55.240314 systemd[1]: Started sshd@11-10.0.0.87:22-10.0.0.1:57440.service. May 8 00:48:55.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.87:22-10.0.0.1:57440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:55.241967 kernel: kauditd_printk_skb: 51 callbacks suppressed May 8 00:48:55.242087 kernel: audit: type=1130 audit(1746665335.239:1016): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.87:22-10.0.0.1:57440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:55.276000 audit[2900]: USER_ACCT pid=2900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.277657 sshd[2900]: Accepted publickey for core from 10.0.0.1 port 57440 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:48:55.283239 sshd[2900]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:48:55.279000 audit[2900]: CRED_ACQ pid=2900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.292939 kernel: audit: type=1101 audit(1746665335.276:1017): pid=2900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.293081 kernel: audit: type=1103 audit(1746665335.279:1018): pid=2900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.293134 kernel: audit: type=1006 audit(1746665335.279:1019): pid=2900 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 8 00:48:55.292482 systemd-logind[1192]: New session 12 of user core. May 8 00:48:55.293680 systemd[1]: Started session-12.scope. May 8 00:48:55.279000 audit[2900]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5a535630 a2=3 a3=0 items=0 ppid=1 pid=2900 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:55.300382 kernel: audit: type=1300 audit(1746665335.279:1019): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5a535630 a2=3 a3=0 items=0 ppid=1 pid=2900 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:48:55.300434 kernel: audit: type=1327 audit(1746665335.279:1019): proctitle=737368643A20636F7265205B707269765D May 8 00:48:55.279000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:48:55.302034 kernel: audit: type=1105 audit(1746665335.297:1020): pid=2900 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.297000 audit[2900]: USER_START pid=2900 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.307114 kernel: audit: type=1103 audit(1746665335.299:1021): pid=2902 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.299000 audit[2902]: CRED_ACQ pid=2902 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.459904 sshd[2900]: pam_unix(sshd:session): session closed for user core May 8 00:48:55.460000 audit[2900]: USER_END pid=2900 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.460000 audit[2900]: CRED_DISP pid=2900 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.469913 kernel: audit: type=1106 audit(1746665335.460:1022): pid=2900 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.469983 kernel: audit: type=1104 audit(1746665335.460:1023): pid=2900 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:48:55.470241 systemd[1]: sshd@11-10.0.0.87:22-10.0.0.1:57440.service: Deactivated successfully. May 8 00:48:55.471146 systemd[1]: session-12.scope: Deactivated successfully. May 8 00:48:55.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.87:22-10.0.0.1:57440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:48:55.472377 systemd-logind[1192]: Session 12 logged out. Waiting for processes to exit. May 8 00:48:55.473312 systemd-logind[1192]: Removed session 12. May 8 00:48:55.526380 env[1211]: time="2025-05-08T00:48:55.526319906Z" level=error msg="Failed to destroy network for sandbox \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.526752 env[1211]: time="2025-05-08T00:48:55.526708515Z" level=error msg="encountered an error cleaning up failed sandbox \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.526811 env[1211]: time="2025-05-08T00:48:55.526772007Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59c4d76dbf-zzmgd,Uid:eece7c19-430f-4e6b-b277-95661b0e90ab,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.527078 kubelet[2105]: E0508 00:48:55.527031 2105 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.527144 kubelet[2105]: E0508 00:48:55.527098 2105 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59c4d76dbf-zzmgd" May 8 00:48:55.527144 kubelet[2105]: E0508 00:48:55.527118 2105 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59c4d76dbf-zzmgd" May 8 00:48:55.527206 kubelet[2105]: E0508 00:48:55.527156 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-59c4d76dbf-zzmgd_calico-apiserver(eece7c19-430f-4e6b-b277-95661b0e90ab)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-59c4d76dbf-zzmgd_calico-apiserver(eece7c19-430f-4e6b-b277-95661b0e90ab)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59c4d76dbf-zzmgd" podUID="eece7c19-430f-4e6b-b277-95661b0e90ab" May 8 00:48:55.540443 env[1211]: time="2025-05-08T00:48:55.540385328Z" level=error msg="Failed to destroy network for sandbox \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.541131 env[1211]: time="2025-05-08T00:48:55.541051954Z" level=error msg="encountered an error cleaning up failed sandbox \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.541292 env[1211]: time="2025-05-08T00:48:55.541139142Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bfc598f-lfzp9,Uid:5bc60802-10c5-4081-acc4-1b877ddcbd86,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.541363 kubelet[2105]: E0508 00:48:55.541325 2105 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.541416 kubelet[2105]: E0508 00:48:55.541383 2105 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bfc598f-lfzp9" May 8 00:48:55.541416 kubelet[2105]: E0508 00:48:55.541405 2105 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bfc598f-lfzp9" May 8 00:48:55.541479 kubelet[2105]: E0508 00:48:55.541438 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6bfc598f-lfzp9_calico-system(5bc60802-10c5-4081-acc4-1b877ddcbd86)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6bfc598f-lfzp9_calico-system(5bc60802-10c5-4081-acc4-1b877ddcbd86)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bfc598f-lfzp9" podUID="5bc60802-10c5-4081-acc4-1b877ddcbd86" May 8 00:48:55.555105 env[1211]: time="2025-05-08T00:48:55.555052722Z" level=error msg="Failed to destroy network for sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.555590 env[1211]: time="2025-05-08T00:48:55.555557044Z" level=error msg="encountered an error cleaning up failed sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.555756 env[1211]: time="2025-05-08T00:48:55.555706612Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7cxtw,Uid:a16f602c-d0cb-4c91-baa4-1387765ec4ad,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.556382 kubelet[2105]: E0508 00:48:55.556079 2105 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.556382 kubelet[2105]: E0508 00:48:55.556132 2105 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7cxtw" May 8 00:48:55.556382 kubelet[2105]: E0508 00:48:55.556151 2105 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7cxtw" May 8 00:48:55.556509 kubelet[2105]: E0508 00:48:55.556194 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-7cxtw_kube-system(a16f602c-d0cb-4c91-baa4-1387765ec4ad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-7cxtw_kube-system(a16f602c-d0cb-4c91-baa4-1387765ec4ad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7cxtw" podUID="a16f602c-d0cb-4c91-baa4-1387765ec4ad" May 8 00:48:55.564576 env[1211]: time="2025-05-08T00:48:55.564507618Z" level=error msg="Failed to destroy network for sandbox \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.565057 env[1211]: time="2025-05-08T00:48:55.565009325Z" level=error msg="encountered an error cleaning up failed sandbox \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.565175 env[1211]: time="2025-05-08T00:48:55.565084169Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59c4d76dbf-sk59c,Uid:4fc668bb-3c8a-4b79-b500-98d947cbaed8,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.565378 kubelet[2105]: E0508 00:48:55.565337 2105 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.565378 kubelet[2105]: E0508 00:48:55.565377 2105 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59c4d76dbf-sk59c" May 8 00:48:55.565378 kubelet[2105]: E0508 00:48:55.565393 2105 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-59c4d76dbf-sk59c" May 8 00:48:55.565626 kubelet[2105]: E0508 00:48:55.565426 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-59c4d76dbf-sk59c_calico-apiserver(4fc668bb-3c8a-4b79-b500-98d947cbaed8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-59c4d76dbf-sk59c_calico-apiserver(4fc668bb-3c8a-4b79-b500-98d947cbaed8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59c4d76dbf-sk59c" podUID="4fc668bb-3c8a-4b79-b500-98d947cbaed8" May 8 00:48:55.572486 env[1211]: time="2025-05-08T00:48:55.572419188Z" level=error msg="Failed to destroy network for sandbox \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.572869 env[1211]: time="2025-05-08T00:48:55.572830029Z" level=error msg="encountered an error cleaning up failed sandbox \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.572904 env[1211]: time="2025-05-08T00:48:55.572882941Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bq7kp,Uid:2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.573250 kubelet[2105]: E0508 00:48:55.573193 2105 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:55.573455 kubelet[2105]: E0508 00:48:55.573264 2105 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-bq7kp" May 8 00:48:55.573455 kubelet[2105]: E0508 00:48:55.573291 2105 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-bq7kp" May 8 00:48:55.573455 kubelet[2105]: E0508 00:48:55.573334 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-bq7kp_kube-system(2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-bq7kp_kube-system(2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-bq7kp" podUID="2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f" May 8 00:48:56.090222 kubelet[2105]: I0508 00:48:56.090175 2105 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" May 8 00:48:56.090849 kubelet[2105]: I0508 00:48:56.090813 2105 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" May 8 00:48:56.091068 env[1211]: time="2025-05-08T00:48:56.090937654Z" level=info msg="StopPodSandbox for \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\"" May 8 00:48:56.091436 env[1211]: time="2025-05-08T00:48:56.091409222Z" level=info msg="StopPodSandbox for \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\"" May 8 00:48:56.092343 kubelet[2105]: I0508 00:48:56.092309 2105 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" May 8 00:48:56.093378 env[1211]: time="2025-05-08T00:48:56.093340513Z" level=info msg="StopPodSandbox for \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\"" May 8 00:48:56.094378 kubelet[2105]: I0508 00:48:56.093954 2105 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:48:56.094708 env[1211]: time="2025-05-08T00:48:56.094519543Z" level=info msg="StopPodSandbox for \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\"" May 8 00:48:56.095369 kubelet[2105]: I0508 00:48:56.095345 2105 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" May 8 00:48:56.095714 env[1211]: time="2025-05-08T00:48:56.095684437Z" level=info msg="StopPodSandbox for \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\"" May 8 00:48:56.123667 env[1211]: time="2025-05-08T00:48:56.123557576Z" level=error msg="StopPodSandbox for \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\" failed" error="failed to destroy network for sandbox \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:56.123884 kubelet[2105]: E0508 00:48:56.123848 2105 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" May 8 00:48:56.123975 kubelet[2105]: E0508 00:48:56.123920 2105 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285"} May 8 00:48:56.123975 kubelet[2105]: E0508 00:48:56.123966 2105 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4fc668bb-3c8a-4b79-b500-98d947cbaed8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:48:56.124114 kubelet[2105]: E0508 00:48:56.123996 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4fc668bb-3c8a-4b79-b500-98d947cbaed8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59c4d76dbf-sk59c" podUID="4fc668bb-3c8a-4b79-b500-98d947cbaed8" May 8 00:48:56.139600 env[1211]: time="2025-05-08T00:48:56.139535002Z" level=error msg="StopPodSandbox for \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\" failed" error="failed to destroy network for sandbox \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:56.140048 kubelet[2105]: E0508 00:48:56.139996 2105 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" May 8 00:48:56.140140 kubelet[2105]: E0508 00:48:56.140060 2105 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4"} May 8 00:48:56.140140 kubelet[2105]: E0508 00:48:56.140095 2105 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5bc60802-10c5-4081-acc4-1b877ddcbd86\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:48:56.140140 kubelet[2105]: E0508 00:48:56.140116 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5bc60802-10c5-4081-acc4-1b877ddcbd86\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bfc598f-lfzp9" podUID="5bc60802-10c5-4081-acc4-1b877ddcbd86" May 8 00:48:56.143202 env[1211]: time="2025-05-08T00:48:56.143134395Z" level=error msg="StopPodSandbox for \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\" failed" error="failed to destroy network for sandbox \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:56.143798 kubelet[2105]: E0508 00:48:56.143679 2105 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" May 8 00:48:56.143798 kubelet[2105]: E0508 00:48:56.143759 2105 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e"} May 8 00:48:56.143798 kubelet[2105]: E0508 00:48:56.143796 2105 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eece7c19-430f-4e6b-b277-95661b0e90ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:48:56.143967 kubelet[2105]: E0508 00:48:56.143819 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eece7c19-430f-4e6b-b277-95661b0e90ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59c4d76dbf-zzmgd" podUID="eece7c19-430f-4e6b-b277-95661b0e90ab" May 8 00:48:56.145580 env[1211]: time="2025-05-08T00:48:56.145516273Z" level=error msg="StopPodSandbox for \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\" failed" error="failed to destroy network for sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:56.145841 kubelet[2105]: E0508 00:48:56.145791 2105 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:48:56.145841 kubelet[2105]: E0508 00:48:56.145828 2105 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f"} May 8 00:48:56.145931 kubelet[2105]: E0508 00:48:56.145851 2105 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a16f602c-d0cb-4c91-baa4-1387765ec4ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:48:56.145931 kubelet[2105]: E0508 00:48:56.145869 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a16f602c-d0cb-4c91-baa4-1387765ec4ad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7cxtw" podUID="a16f602c-d0cb-4c91-baa4-1387765ec4ad" May 8 00:48:56.149073 env[1211]: time="2025-05-08T00:48:56.149028048Z" level=error msg="StopPodSandbox for \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\" failed" error="failed to destroy network for sandbox \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:48:56.149295 kubelet[2105]: E0508 00:48:56.149240 2105 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" May 8 00:48:56.149346 kubelet[2105]: E0508 00:48:56.149303 2105 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae"} May 8 00:48:56.149346 kubelet[2105]: E0508 00:48:56.149335 2105 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:48:56.149424 kubelet[2105]: E0508 00:48:56.149358 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-bq7kp" podUID="2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f" May 8 00:48:56.350730 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f-shm.mount: Deactivated successfully. May 8 00:48:56.350877 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4-shm.mount: Deactivated successfully. May 8 00:48:56.350965 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae-shm.mount: Deactivated successfully. May 8 00:48:56.351049 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e-shm.mount: Deactivated successfully. May 8 00:49:00.467304 systemd[1]: Started sshd@12-10.0.0.87:22-10.0.0.1:57444.service. May 8 00:49:00.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.87:22-10.0.0.1:57444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:00.469327 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:49:00.469408 kernel: audit: type=1130 audit(1746665340.465:1025): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.87:22-10.0.0.1:57444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:00.507000 audit[3224]: USER_ACCT pid=3224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.509230 sshd[3224]: Accepted publickey for core from 10.0.0.1 port 57444 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:00.511281 sshd[3224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:00.509000 audit[3224]: CRED_ACQ pid=3224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.516003 systemd-logind[1192]: New session 13 of user core. May 8 00:49:00.516888 systemd[1]: Started session-13.scope. May 8 00:49:00.520394 kernel: audit: type=1101 audit(1746665340.507:1026): pid=3224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.520466 kernel: audit: type=1103 audit(1746665340.509:1027): pid=3224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.520506 kernel: audit: type=1006 audit(1746665340.509:1028): pid=3224 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 8 00:49:00.509000 audit[3224]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde64b7ec0 a2=3 a3=0 items=0 ppid=1 pid=3224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:00.529548 kernel: audit: type=1300 audit(1746665340.509:1028): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde64b7ec0 a2=3 a3=0 items=0 ppid=1 pid=3224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:00.529601 kernel: audit: type=1327 audit(1746665340.509:1028): proctitle=737368643A20636F7265205B707269765D May 8 00:49:00.509000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:00.521000 audit[3224]: USER_START pid=3224 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.537509 kernel: audit: type=1105 audit(1746665340.521:1029): pid=3224 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.537572 kernel: audit: type=1103 audit(1746665340.523:1030): pid=3226 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.523000 audit[3226]: CRED_ACQ pid=3226 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.668795 sshd[3224]: pam_unix(sshd:session): session closed for user core May 8 00:49:00.668000 audit[3224]: USER_END pid=3224 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.671726 systemd[1]: sshd@12-10.0.0.87:22-10.0.0.1:57444.service: Deactivated successfully. May 8 00:49:00.672453 systemd[1]: session-13.scope: Deactivated successfully. May 8 00:49:00.668000 audit[3224]: CRED_DISP pid=3224 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.676315 systemd-logind[1192]: Session 13 logged out. Waiting for processes to exit. May 8 00:49:00.677040 systemd-logind[1192]: Removed session 13. May 8 00:49:00.678866 kernel: audit: type=1106 audit(1746665340.668:1031): pid=3224 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.678928 kernel: audit: type=1104 audit(1746665340.668:1032): pid=3224 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:00.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.87:22-10.0.0.1:57444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:05.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.87:22-10.0.0.1:41960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:05.674024 systemd[1]: Started sshd@13-10.0.0.87:22-10.0.0.1:41960.service. May 8 00:49:05.675136 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:49:05.675178 kernel: audit: type=1130 audit(1746665345.672:1034): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.87:22-10.0.0.1:41960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:05.710000 audit[3241]: USER_ACCT pid=3241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.716761 kernel: audit: type=1101 audit(1746665345.710:1035): pid=3241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.716807 sshd[3241]: Accepted publickey for core from 10.0.0.1 port 41960 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:05.717023 sshd[3241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:05.714000 audit[3241]: CRED_ACQ pid=3241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.730890 kernel: audit: type=1103 audit(1746665345.714:1036): pid=3241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.731050 kernel: audit: type=1006 audit(1746665345.714:1037): pid=3241 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 8 00:49:05.731082 kernel: audit: type=1300 audit(1746665345.714:1037): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c5d44d0 a2=3 a3=0 items=0 ppid=1 pid=3241 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:05.731114 kernel: audit: type=1327 audit(1746665345.714:1037): proctitle=737368643A20636F7265205B707269765D May 8 00:49:05.714000 audit[3241]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c5d44d0 a2=3 a3=0 items=0 ppid=1 pid=3241 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:05.714000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:05.736114 systemd-logind[1192]: New session 14 of user core. May 8 00:49:05.737458 systemd[1]: Started session-14.scope. May 8 00:49:05.742000 audit[3241]: USER_START pid=3241 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.748818 kernel: audit: type=1105 audit(1746665345.742:1038): pid=3241 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.743000 audit[3243]: CRED_ACQ pid=3243 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.752683 kernel: audit: type=1103 audit(1746665345.743:1039): pid=3243 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.902426 sshd[3241]: pam_unix(sshd:session): session closed for user core May 8 00:49:05.902000 audit[3241]: USER_END pid=3241 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.909685 kernel: audit: type=1106 audit(1746665345.902:1040): pid=3241 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.902000 audit[3241]: CRED_DISP pid=3241 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.911859 systemd[1]: sshd@13-10.0.0.87:22-10.0.0.1:41960.service: Deactivated successfully. May 8 00:49:05.913146 systemd[1]: session-14.scope: Deactivated successfully. May 8 00:49:05.915691 kernel: audit: type=1104 audit(1746665345.902:1041): pid=3241 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.87:22-10.0.0.1:41960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:05.915431 systemd-logind[1192]: Session 14 logged out. Waiting for processes to exit. May 8 00:49:05.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.87:22-10.0.0.1:41968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:05.916528 systemd[1]: Started sshd@14-10.0.0.87:22-10.0.0.1:41968.service. May 8 00:49:05.918317 systemd-logind[1192]: Removed session 14. May 8 00:49:05.952000 audit[3256]: USER_ACCT pid=3256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.955105 sshd[3256]: Accepted publickey for core from 10.0.0.1 port 41968 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:05.954000 audit[3256]: CRED_ACQ pid=3256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.954000 audit[3256]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd5401bc0 a2=3 a3=0 items=0 ppid=1 pid=3256 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:05.954000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:05.956326 sshd[3256]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:05.961042 systemd-logind[1192]: New session 15 of user core. May 8 00:49:05.961884 systemd[1]: Started session-15.scope. May 8 00:49:05.966000 audit[3256]: USER_START pid=3256 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:05.967000 audit[3258]: CRED_ACQ pid=3258 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:06.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.87:22-10.0.0.1:41970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:06.166876 systemd[1]: Started sshd@15-10.0.0.87:22-10.0.0.1:41970.service. May 8 00:49:06.168088 sshd[3256]: pam_unix(sshd:session): session closed for user core May 8 00:49:06.167000 audit[3256]: USER_END pid=3256 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:06.167000 audit[3256]: CRED_DISP pid=3256 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:06.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.87:22-10.0.0.1:41968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:06.171198 systemd[1]: sshd@14-10.0.0.87:22-10.0.0.1:41968.service: Deactivated successfully. May 8 00:49:06.172194 systemd[1]: session-15.scope: Deactivated successfully. May 8 00:49:06.173660 systemd-logind[1192]: Session 15 logged out. Waiting for processes to exit. May 8 00:49:06.175022 systemd-logind[1192]: Removed session 15. May 8 00:49:06.205000 audit[3266]: USER_ACCT pid=3266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:06.207836 sshd[3266]: Accepted publickey for core from 10.0.0.1 port 41970 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:06.206000 audit[3266]: CRED_ACQ pid=3266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:06.207000 audit[3266]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde88d5590 a2=3 a3=0 items=0 ppid=1 pid=3266 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:06.207000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:06.209114 sshd[3266]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:06.213508 systemd-logind[1192]: New session 16 of user core. May 8 00:49:06.214670 systemd[1]: Started session-16.scope. May 8 00:49:06.217000 audit[3266]: USER_START pid=3266 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:06.219000 audit[3269]: CRED_ACQ pid=3269 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:06.629088 sshd[3266]: pam_unix(sshd:session): session closed for user core May 8 00:49:06.628000 audit[3266]: USER_END pid=3266 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:06.628000 audit[3266]: CRED_DISP pid=3266 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:06.631860 systemd[1]: sshd@15-10.0.0.87:22-10.0.0.1:41970.service: Deactivated successfully. May 8 00:49:06.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.87:22-10.0.0.1:41970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:06.632679 systemd[1]: session-16.scope: Deactivated successfully. May 8 00:49:06.633323 systemd-logind[1192]: Session 16 logged out. Waiting for processes to exit. May 8 00:49:06.634088 systemd-logind[1192]: Removed session 16. May 8 00:49:06.894202 env[1211]: time="2025-05-08T00:49:06.894070543Z" level=info msg="StopPodSandbox for \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\"" May 8 00:49:06.933794 env[1211]: time="2025-05-08T00:49:06.933715514Z" level=error msg="StopPodSandbox for \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\" failed" error="failed to destroy network for sandbox \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:49:06.934073 kubelet[2105]: E0508 00:49:06.934000 2105 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" May 8 00:49:06.934449 kubelet[2105]: E0508 00:49:06.934080 2105 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4"} May 8 00:49:06.934449 kubelet[2105]: E0508 00:49:06.934123 2105 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5bc60802-10c5-4081-acc4-1b877ddcbd86\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:49:06.934449 kubelet[2105]: E0508 00:49:06.934153 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5bc60802-10c5-4081-acc4-1b877ddcbd86\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bfc598f-lfzp9" podUID="5bc60802-10c5-4081-acc4-1b877ddcbd86" May 8 00:49:07.519516 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount670301044.mount: Deactivated successfully. May 8 00:49:08.893828 env[1211]: time="2025-05-08T00:49:08.893764718Z" level=info msg="StopPodSandbox for \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\"" May 8 00:49:08.894305 env[1211]: time="2025-05-08T00:49:08.894273752Z" level=info msg="StopPodSandbox for \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\"" May 8 00:49:08.894755 env[1211]: time="2025-05-08T00:49:08.894713142Z" level=info msg="StopPodSandbox for \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\"" May 8 00:49:09.755120 env[1211]: time="2025-05-08T00:49:09.755035637Z" level=error msg="StopPodSandbox for \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\" failed" error="failed to destroy network for sandbox \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:49:09.755385 kubelet[2105]: E0508 00:49:09.755335 2105 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" May 8 00:49:09.755800 kubelet[2105]: E0508 00:49:09.755398 2105 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae"} May 8 00:49:09.755800 kubelet[2105]: E0508 00:49:09.755430 2105 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:49:09.755800 kubelet[2105]: E0508 00:49:09.755452 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-bq7kp" podUID="2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f" May 8 00:49:09.756080 kubelet[2105]: E0508 00:49:09.756008 2105 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" May 8 00:49:09.756080 kubelet[2105]: E0508 00:49:09.756037 2105 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285"} May 8 00:49:09.756080 kubelet[2105]: E0508 00:49:09.756069 2105 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4fc668bb-3c8a-4b79-b500-98d947cbaed8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:49:09.756333 env[1211]: time="2025-05-08T00:49:09.755827190Z" level=error msg="StopPodSandbox for \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\" failed" error="failed to destroy network for sandbox \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:49:09.756399 kubelet[2105]: E0508 00:49:09.756088 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4fc668bb-3c8a-4b79-b500-98d947cbaed8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59c4d76dbf-sk59c" podUID="4fc668bb-3c8a-4b79-b500-98d947cbaed8" May 8 00:49:09.756746 env[1211]: time="2025-05-08T00:49:09.756631237Z" level=error msg="StopPodSandbox for \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\" failed" error="failed to destroy network for sandbox \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:49:09.756977 kubelet[2105]: E0508 00:49:09.756897 2105 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" May 8 00:49:09.756977 kubelet[2105]: E0508 00:49:09.756965 2105 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e"} May 8 00:49:09.757121 kubelet[2105]: E0508 00:49:09.756986 2105 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eece7c19-430f-4e6b-b277-95661b0e90ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:49:09.757121 kubelet[2105]: E0508 00:49:09.757014 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eece7c19-430f-4e6b-b277-95661b0e90ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-59c4d76dbf-zzmgd" podUID="eece7c19-430f-4e6b-b277-95661b0e90ab" May 8 00:49:09.796016 env[1211]: time="2025-05-08T00:49:09.795942115Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:09.800069 env[1211]: time="2025-05-08T00:49:09.800023876Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:09.803195 env[1211]: time="2025-05-08T00:49:09.803149230Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:09.805326 env[1211]: time="2025-05-08T00:49:09.805284692Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:09.805640 env[1211]: time="2025-05-08T00:49:09.805595155Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 8 00:49:09.820575 env[1211]: time="2025-05-08T00:49:09.820518749Z" level=info msg="CreateContainer within sandbox \"76b8acd8f2168ffc51131ad24a48c5717e89cf356f2175b4c261ad4b4bd64c26\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 8 00:49:09.852941 env[1211]: time="2025-05-08T00:49:09.852854626Z" level=info msg="CreateContainer within sandbox \"76b8acd8f2168ffc51131ad24a48c5717e89cf356f2175b4c261ad4b4bd64c26\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"456244fa3beda936874c6663c195b97827c94a74d6be3ab5149af47107d039f2\"" May 8 00:49:09.853617 env[1211]: time="2025-05-08T00:49:09.853578299Z" level=info msg="StartContainer for \"456244fa3beda936874c6663c195b97827c94a74d6be3ab5149af47107d039f2\"" May 8 00:49:09.874966 systemd[1]: Started cri-containerd-456244fa3beda936874c6663c195b97827c94a74d6be3ab5149af47107d039f2.scope. May 8 00:49:09.894198 env[1211]: time="2025-05-08T00:49:09.894132202Z" level=info msg="StopPodSandbox for \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\"" May 8 00:49:09.902000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4a7c1f28d8 items=0 ppid=2563 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:09.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363234346661336265646139333638373463363636336331393562 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit: BPF prog-id=133 op=LOAD May 8 00:49:09.902000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000319068 items=0 ppid=2563 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:09.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363234346661336265646139333638373463363636336331393562 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.902000 audit: BPF prog-id=134 op=LOAD May 8 00:49:09.902000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003190b8 items=0 ppid=2563 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:09.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363234346661336265646139333638373463363636336331393562 May 8 00:49:09.902000 audit: BPF prog-id=134 op=UNLOAD May 8 00:49:09.902000 audit: BPF prog-id=133 op=UNLOAD May 8 00:49:09.903000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.903000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.903000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.903000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.903000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.903000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.903000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.903000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.903000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.903000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:09.903000 audit: BPF prog-id=135 op=LOAD May 8 00:49:09.903000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000319148 items=0 ppid=2563 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:09.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435363234346661336265646139333638373463363636336331393562 May 8 00:49:09.947713 env[1211]: time="2025-05-08T00:49:09.947542569Z" level=error msg="StopPodSandbox for \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\" failed" error="failed to destroy network for sandbox \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:49:09.948177 kubelet[2105]: E0508 00:49:09.947963 2105 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" May 8 00:49:09.948177 kubelet[2105]: E0508 00:49:09.948058 2105 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7"} May 8 00:49:09.948177 kubelet[2105]: E0508 00:49:09.948104 2105 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"95af3a69-e90f-40a0-a3a8-e84fbf9772e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:49:09.948177 kubelet[2105]: E0508 00:49:09.948130 2105 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"95af3a69-e90f-40a0-a3a8-e84fbf9772e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k7qpk" podUID="95af3a69-e90f-40a0-a3a8-e84fbf9772e8" May 8 00:49:09.961237 env[1211]: time="2025-05-08T00:49:09.961153676Z" level=info msg="StartContainer for \"456244fa3beda936874c6663c195b97827c94a74d6be3ab5149af47107d039f2\" returns successfully" May 8 00:49:10.039364 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 8 00:49:10.039610 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 8 00:49:10.128764 kubelet[2105]: E0508 00:49:10.128709 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:10.671000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:10.671000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:10.671000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b3a560 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:49:10.671000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:49:10.671000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f04060 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:49:10.671000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:49:10.893446 env[1211]: time="2025-05-08T00:49:10.893376270Z" level=info msg="StopPodSandbox for \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\"" May 8 00:49:11.014031 kubelet[2105]: I0508 00:49:11.013954 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6x8qw" podStartSLOduration=2.772439608 podStartE2EDuration="34.013932246s" podCreationTimestamp="2025-05-08 00:48:37 +0000 UTC" firstStartedPulling="2025-05-08 00:48:38.565162944 +0000 UTC m=+23.777920984" lastFinishedPulling="2025-05-08 00:49:09.806655582 +0000 UTC m=+55.019413622" observedRunningTime="2025-05-08 00:49:10.158862417 +0000 UTC m=+55.371620447" watchObservedRunningTime="2025-05-08 00:49:11.013932246 +0000 UTC m=+56.226690286" May 8 00:49:11.131352 kubelet[2105]: E0508 00:49:11.131305 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.014 [INFO][3530] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.015 [INFO][3530] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" iface="eth0" netns="/var/run/netns/cni-08092d19-bbf5-3797-bebc-3f68ea721cef" May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.015 [INFO][3530] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" iface="eth0" netns="/var/run/netns/cni-08092d19-bbf5-3797-bebc-3f68ea721cef" May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.018 [INFO][3530] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" iface="eth0" netns="/var/run/netns/cni-08092d19-bbf5-3797-bebc-3f68ea721cef" May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.018 [INFO][3530] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.018 [INFO][3530] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.131 [INFO][3538] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" HandleID="k8s-pod-network.eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.132 [INFO][3538] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.133 [INFO][3538] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.141 [WARNING][3538] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" HandleID="k8s-pod-network.eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.141 [INFO][3538] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" HandleID="k8s-pod-network.eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.142 [INFO][3538] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:11.146301 env[1211]: 2025-05-08 00:49:11.144 [INFO][3530] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:11.147542 env[1211]: time="2025-05-08T00:49:11.146454438Z" level=info msg="TearDown network for sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\" successfully" May 8 00:49:11.147542 env[1211]: time="2025-05-08T00:49:11.146487992Z" level=info msg="StopPodSandbox for \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\" returns successfully" May 8 00:49:11.149325 systemd[1]: run-netns-cni\x2d08092d19\x2dbbf5\x2d3797\x2dbebc\x2d3f68ea721cef.mount: Deactivated successfully. May 8 00:49:11.150444 kubelet[2105]: E0508 00:49:11.150395 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:11.151577 env[1211]: time="2025-05-08T00:49:11.151531123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7cxtw,Uid:a16f602c-d0cb-4c91-baa4-1387765ec4ad,Namespace:kube-system,Attempt:1,}" May 8 00:49:11.382000 audit[3649]: AVC avc: denied { write } for pid=3649 comm="tee" name="fd" dev="proc" ino=25928 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:49:11.383880 kernel: kauditd_printk_skb: 72 callbacks suppressed May 8 00:49:11.383971 kernel: audit: type=1400 audit(1746665351.382:1069): avc: denied { write } for pid=3649 comm="tee" name="fd" dev="proc" ino=25928 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:49:11.382000 audit[3649]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee2398a26 a2=241 a3=1b6 items=1 ppid=3618 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.392931 kernel: audit: type=1300 audit(1746665351.382:1069): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee2398a26 a2=241 a3=1b6 items=1 ppid=3618 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.382000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 8 00:49:11.382000 audit: PATH item=0 name="/dev/fd/63" inode=27855 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:49:11.398495 systemd-networkd[1025]: cali4fb0d3f25e5: Link UP May 8 00:49:11.398666 systemd-networkd[1025]: cali4fb0d3f25e5: Gained carrier May 8 00:49:11.401041 kernel: audit: type=1307 audit(1746665351.382:1069): cwd="/etc/service/enabled/bird6/log" May 8 00:49:11.401117 kernel: audit: type=1302 audit(1746665351.382:1069): item=0 name="/dev/fd/63" inode=27855 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:49:11.401155 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4fb0d3f25e5: link becomes ready May 8 00:49:11.403759 kernel: audit: type=1327 audit(1746665351.382:1069): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:49:11.382000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:49:11.424278 kernel: audit: type=1400 audit(1746665351.383:1070): avc: denied { write } for pid=3630 comm="tee" name="fd" dev="proc" ino=25932 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:49:11.383000 audit[3630]: AVC avc: denied { write } for pid=3630 comm="tee" name="fd" dev="proc" ino=25932 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:49:11.383000 audit[3630]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe27b2aa26 a2=241 a3=1b6 items=1 ppid=3602 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.445884 kernel: audit: type=1300 audit(1746665351.383:1070): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe27b2aa26 a2=241 a3=1b6 items=1 ppid=3602 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.446080 kernel: audit: type=1307 audit(1746665351.383:1070): cwd="/etc/service/enabled/confd/log" May 8 00:49:11.383000 audit: CWD cwd="/etc/service/enabled/confd/log" May 8 00:49:11.449490 kernel: audit: type=1302 audit(1746665351.383:1070): item=0 name="/dev/fd/63" inode=26813 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:49:11.383000 audit: PATH item=0 name="/dev/fd/63" inode=26813 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:49:11.452785 kernel: audit: type=1327 audit(1746665351.383:1070): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:49:11.383000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:49:11.387000 audit[3634]: AVC avc: denied { write } for pid=3634 comm="tee" name="fd" dev="proc" ino=25938 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:49:11.387000 audit[3634]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe17da2a27 a2=241 a3=1b6 items=1 ppid=3599 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.387000 audit: CWD cwd="/etc/service/enabled/bird/log" May 8 00:49:11.387000 audit: PATH item=0 name="/dev/fd/63" inode=26814 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:49:11.387000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:49:11.387000 audit[3626]: AVC avc: denied { write } for pid=3626 comm="tee" name="fd" dev="proc" ino=25942 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:49:11.387000 audit[3626]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7cd31a16 a2=241 a3=1b6 items=1 ppid=3598 pid=3626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.387000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 8 00:49:11.387000 audit: PATH item=0 name="/dev/fd/63" inode=26810 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:49:11.387000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:49:11.406000 audit[3669]: AVC avc: denied { write } for pid=3669 comm="tee" name="fd" dev="proc" ino=26849 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:49:11.406000 audit[3669]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9f219a26 a2=241 a3=1b6 items=1 ppid=3611 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.406000 audit: CWD cwd="/etc/service/enabled/felix/log" May 8 00:49:11.406000 audit: PATH item=0 name="/dev/fd/63" inode=27864 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:49:11.406000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:49:11.436000 audit[3678]: AVC avc: denied { write } for pid=3678 comm="tee" name="fd" dev="proc" ino=26859 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:49:11.436000 audit[3678]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd70d10a17 a2=241 a3=1b6 items=1 ppid=3617 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.436000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 8 00:49:11.436000 audit: PATH item=0 name="/dev/fd/63" inode=25213 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:49:11.436000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:49:11.442000 audit[3665]: AVC avc: denied { write } for pid=3665 comm="tee" name="fd" dev="proc" ino=25216 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:49:11.442000 audit[3665]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe65cea28 a2=241 a3=1b6 items=1 ppid=3621 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.442000 audit: CWD cwd="/etc/service/enabled/cni/log" May 8 00:49:11.442000 audit: PATH item=0 name="/dev/fd/63" inode=26840 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:49:11.442000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.194 [INFO][3571] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.221 [INFO][3571] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0 coredns-7db6d8ff4d- kube-system a16f602c-d0cb-4c91-baa4-1387765ec4ad 894 0 2025-05-08 00:48:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-7cxtw eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4fb0d3f25e5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7cxtw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7cxtw-" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.221 [INFO][3571] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7cxtw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.275 [INFO][3583] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" HandleID="k8s-pod-network.645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.286 [INFO][3583] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" HandleID="k8s-pod-network.645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027f3f0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-7cxtw", "timestamp":"2025-05-08 00:49:11.275093456 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.286 [INFO][3583] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.286 [INFO][3583] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.286 [INFO][3583] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.289 [INFO][3583] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" host="localhost" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.295 [INFO][3583] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.299 [INFO][3583] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.300 [INFO][3583] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.302 [INFO][3583] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.302 [INFO][3583] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" host="localhost" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.304 [INFO][3583] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.317 [INFO][3583] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" host="localhost" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.375 [INFO][3583] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" host="localhost" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.375 [INFO][3583] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" host="localhost" May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.375 [INFO][3583] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:11.462203 env[1211]: 2025-05-08 00:49:11.376 [INFO][3583] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" HandleID="k8s-pod-network.645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:11.463157 env[1211]: 2025-05-08 00:49:11.378 [INFO][3571] cni-plugin/k8s.go 386: Populated endpoint ContainerID="645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7cxtw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a16f602c-d0cb-4c91-baa4-1387765ec4ad", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-7cxtw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4fb0d3f25e5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:11.463157 env[1211]: 2025-05-08 00:49:11.378 [INFO][3571] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7cxtw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:11.463157 env[1211]: 2025-05-08 00:49:11.378 [INFO][3571] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4fb0d3f25e5 ContainerID="645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7cxtw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:11.463157 env[1211]: 2025-05-08 00:49:11.402 [INFO][3571] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7cxtw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:11.463157 env[1211]: 2025-05-08 00:49:11.410 [INFO][3571] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7cxtw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a16f602c-d0cb-4c91-baa4-1387765ec4ad", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e", Pod:"coredns-7db6d8ff4d-7cxtw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4fb0d3f25e5", MAC:"4a:98:57:52:4a:26", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:11.463157 env[1211]: 2025-05-08 00:49:11.458 [INFO][3571] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7cxtw" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:11.488000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:11.488000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c009264c30 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:49:11.488000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:49:11.488000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:11.488000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0090a7380 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:49:11.488000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:49:11.489000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:11.489000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009266680 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:49:11.489000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:49:11.490000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:11.490000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c006ec18f0 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:49:11.490000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:49:11.499000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:11.499000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c005018ba0 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:49:11.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:49:11.502000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:11.502000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00678c330 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:49:11.502000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:49:11.530111 env[1211]: time="2025-05-08T00:49:11.529998990Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:49:11.568397 env[1211]: time="2025-05-08T00:49:11.530111835Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:49:11.568397 env[1211]: time="2025-05-08T00:49:11.530152693Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:49:11.568397 env[1211]: time="2025-05-08T00:49:11.530437407Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e pid=3710 runtime=io.containerd.runc.v2 May 8 00:49:11.581864 systemd[1]: Started cri-containerd-645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e.scope. May 8 00:49:11.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.594000 audit: BPF prog-id=136 op=LOAD May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3710 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634353830316263303735333138303839623237353463623863313066 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3710 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634353830316263303735333138303839623237353463623863313066 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit: BPF prog-id=137 op=LOAD May 8 00:49:11.595000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d7ce0 items=0 ppid=3710 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634353830316263303735333138303839623237353463623863313066 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit: BPF prog-id=138 op=LOAD May 8 00:49:11.595000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d7d28 items=0 ppid=3710 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634353830316263303735333138303839623237353463623863313066 May 8 00:49:11.595000 audit: BPF prog-id=138 op=UNLOAD May 8 00:49:11.595000 audit: BPF prog-id=137 op=UNLOAD May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { perfmon } for pid=3721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit[3721]: AVC avc: denied { bpf } for pid=3721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.595000 audit: BPF prog-id=139 op=LOAD May 8 00:49:11.595000 audit[3721]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d8138 items=0 ppid=3710 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634353830316263303735333138303839623237353463623863313066 May 8 00:49:11.597285 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:49:11.619043 env[1211]: time="2025-05-08T00:49:11.618993472Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7cxtw,Uid:a16f602c-d0cb-4c91-baa4-1387765ec4ad,Namespace:kube-system,Attempt:1,} returns sandbox id \"645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e\"" May 8 00:49:11.619835 kubelet[2105]: E0508 00:49:11.619808 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:11.622143 env[1211]: time="2025-05-08T00:49:11.622107619Z" level=info msg="CreateContainer within sandbox \"645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:49:11.634002 systemd[1]: Started sshd@16-10.0.0.87:22-10.0.0.1:41982.service. May 8 00:49:11.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.87:22-10.0.0.1:41982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit: BPF prog-id=140 op=LOAD May 8 00:49:11.728000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd975baa30 a2=98 a3=3 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.728000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.728000 audit: BPF prog-id=140 op=UNLOAD May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit: BPF prog-id=141 op=LOAD May 8 00:49:11.728000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd975ba810 a2=74 a3=540051 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.728000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.728000 audit: BPF prog-id=141 op=UNLOAD May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.728000 audit: BPF prog-id=142 op=LOAD May 8 00:49:11.728000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd975ba840 a2=94 a3=2 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.728000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.728000 audit: BPF prog-id=142 op=UNLOAD May 8 00:49:11.752000 audit[3745]: USER_ACCT pid=3745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:11.753828 sshd[3745]: Accepted publickey for core from 10.0.0.1 port 41982 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:11.754000 audit[3745]: CRED_ACQ pid=3745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:11.754000 audit[3745]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb8d544d0 a2=3 a3=0 items=0 ppid=1 pid=3745 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.754000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:11.756928 sshd[3745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:11.763500 systemd[1]: Started session-17.scope. May 8 00:49:11.765359 systemd-logind[1192]: New session 17 of user core. May 8 00:49:11.771000 audit[3745]: USER_START pid=3745 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:11.772000 audit[3777]: CRED_ACQ pid=3777 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:11.855000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.855000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.855000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.855000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.855000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.855000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.855000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.855000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.855000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.855000 audit: BPF prog-id=143 op=LOAD May 8 00:49:11.855000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd975ba700 a2=40 a3=1 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.855000 audit: BPF prog-id=143 op=UNLOAD May 8 00:49:11.855000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.855000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd975ba7d0 a2=50 a3=7ffd975ba8b0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd975ba710 a2=28 a3=0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd975ba740 a2=28 a3=0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd975ba650 a2=28 a3=0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd975ba760 a2=28 a3=0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd975ba740 a2=28 a3=0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd975ba730 a2=28 a3=0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd975ba760 a2=28 a3=0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd975ba740 a2=28 a3=0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd975ba760 a2=28 a3=0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd975ba730 a2=28 a3=0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd975ba7a0 a2=28 a3=0 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.862000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.862000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd975ba550 a2=50 a3=1 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit: BPF prog-id=144 op=LOAD May 8 00:49:11.863000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd975ba550 a2=94 a3=5 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.863000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.863000 audit: BPF prog-id=144 op=UNLOAD May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd975ba600 a2=50 a3=1 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.863000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd975ba720 a2=4 a3=38 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.863000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:49:11.863000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd975ba770 a2=94 a3=6 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.863000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:49:11.863000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd975b9f20 a2=94 a3=83 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.863000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.863000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:49:11.863000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd975b9f20 a2=94 a3=83 items=0 ppid=3616 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.863000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit: BPF prog-id=145 op=LOAD May 8 00:49:11.870000 audit[3781]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe980800e0 a2=98 a3=1999999999999999 items=0 ppid=3616 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.870000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:49:11.870000 audit: BPF prog-id=145 op=UNLOAD May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit: BPF prog-id=146 op=LOAD May 8 00:49:11.870000 audit[3781]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9807ffc0 a2=74 a3=ffff items=0 ppid=3616 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.870000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:49:11.870000 audit: BPF prog-id=146 op=UNLOAD May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.870000 audit: BPF prog-id=147 op=LOAD May 8 00:49:11.870000 audit[3781]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe98080000 a2=40 a3=7ffe980801e0 items=0 ppid=3616 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.870000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:49:11.870000 audit: BPF prog-id=147 op=UNLOAD May 8 00:49:11.927832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3623277771.mount: Deactivated successfully. May 8 00:49:11.935166 systemd-networkd[1025]: vxlan.calico: Link UP May 8 00:49:11.935175 systemd-networkd[1025]: vxlan.calico: Gained carrier May 8 00:49:11.948000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.948505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount159664906.mount: Deactivated successfully. May 8 00:49:11.948000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.948000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.948000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.948000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.948000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.948000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.948000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.948000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.948000 audit: BPF prog-id=148 op=LOAD May 8 00:49:11.948000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1da34c60 a2=98 a3=ffffffff items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit: BPF prog-id=148 op=UNLOAD May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit: BPF prog-id=149 op=LOAD May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1da34a70 a2=74 a3=540051 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit: BPF prog-id=149 op=UNLOAD May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit: BPF prog-id=150 op=LOAD May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1da34aa0 a2=94 a3=2 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit: BPF prog-id=150 op=UNLOAD May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1da34970 a2=28 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1da349a0 a2=28 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1da348b0 a2=28 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1da349c0 a2=28 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1da349a0 a2=28 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1da34990 a2=28 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1da349c0 a2=28 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1da349a0 a2=28 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1da349c0 a2=28 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1da34990 a2=28 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1da34a00 a2=28 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.950000 audit: BPF prog-id=151 op=LOAD May 8 00:49:11.950000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd1da34870 a2=40 a3=0 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.950000 audit: BPF prog-id=151 op=UNLOAD May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd1da34860 a2=50 a3=2800 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd1da34860 a2=50 a3=2800 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit: BPF prog-id=152 op=LOAD May 8 00:49:11.951000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd1da34080 a2=94 a3=2 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.951000 audit: BPF prog-id=152 op=UNLOAD May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.951000 audit: BPF prog-id=153 op=LOAD May 8 00:49:11.951000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd1da34180 a2=94 a3=30 items=0 ppid=3616 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit: BPF prog-id=154 op=LOAD May 8 00:49:11.956000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb7bd46a0 a2=98 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.956000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:11.956000 audit: BPF prog-id=154 op=UNLOAD May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit: BPF prog-id=155 op=LOAD May 8 00:49:11.956000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb7bd4480 a2=74 a3=540051 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.956000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:11.956000 audit: BPF prog-id=155 op=UNLOAD May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:11.956000 audit: BPF prog-id=156 op=LOAD May 8 00:49:11.956000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb7bd44b0 a2=94 a3=2 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:11.956000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:11.956000 audit: BPF prog-id=156 op=UNLOAD May 8 00:49:12.071000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.071000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.071000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.071000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.071000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.071000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.071000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.071000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.071000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.071000 audit: BPF prog-id=157 op=LOAD May 8 00:49:12.071000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb7bd4370 a2=40 a3=1 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.071000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.072000 audit: BPF prog-id=157 op=UNLOAD May 8 00:49:12.072000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.072000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb7bd4440 a2=50 a3=7ffeb7bd4520 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.072000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb7bd4380 a2=28 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb7bd43b0 a2=28 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb7bd42c0 a2=28 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb7bd43d0 a2=28 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb7bd43b0 a2=28 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb7bd43a0 a2=28 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb7bd43d0 a2=28 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb7bd43b0 a2=28 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb7bd43d0 a2=28 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb7bd43a0 a2=28 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb7bd4410 a2=28 a3=0 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb7bd41c0 a2=50 a3=1 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.080000 audit: BPF prog-id=158 op=LOAD May 8 00:49:12.080000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb7bd41c0 a2=94 a3=5 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.081000 audit: BPF prog-id=158 op=UNLOAD May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb7bd4270 a2=50 a3=1 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeb7bd4390 a2=4 a3=38 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { confidentiality } for pid=3817 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:49:12.081000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb7bd43e0 a2=94 a3=6 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { confidentiality } for pid=3817 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:49:12.081000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb7bd3b90 a2=94 a3=83 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { confidentiality } for pid=3817 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:49:12.081000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb7bd3b90 a2=94 a3=83 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.081000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.081000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb7bd55d0 a2=10 a3=208 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.082000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.082000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb7bd5470 a2=10 a3=3 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.082000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.082000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.082000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb7bd5410 a2=10 a3=3 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.082000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.082000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.082000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb7bd5410 a2=10 a3=7 items=0 ppid=3616 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.082000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:49:12.089000 audit[3745]: USER_END pid=3745 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:12.089000 audit[3745]: CRED_DISP pid=3745 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:12.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.87:22-10.0.0.1:41982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:12.093000 audit: BPF prog-id=153 op=UNLOAD May 8 00:49:12.089101 sshd[3745]: pam_unix(sshd:session): session closed for user core May 8 00:49:12.092396 systemd[1]: sshd@16-10.0.0.87:22-10.0.0.1:41982.service: Deactivated successfully. May 8 00:49:12.202103 kubelet[2105]: E0508 00:49:12.134792 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:12.093106 systemd[1]: session-17.scope: Deactivated successfully. May 8 00:49:12.093829 systemd-logind[1192]: Session 17 logged out. Waiting for processes to exit. May 8 00:49:12.094667 systemd-logind[1192]: Removed session 17. May 8 00:49:12.220000 audit[3873]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3873 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:49:12.220000 audit[3873]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe1ce82aa0 a2=0 a3=7ffe1ce82a8c items=0 ppid=3616 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.220000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:49:12.228153 env[1211]: time="2025-05-08T00:49:12.228077708Z" level=info msg="CreateContainer within sandbox \"645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"49741831dd8bdfc3df5567a7305b2252b328af09d72b25b3fc23ee2a6a801547\"" May 8 00:49:12.229625 env[1211]: time="2025-05-08T00:49:12.229564626Z" level=info msg="StartContainer for \"49741831dd8bdfc3df5567a7305b2252b328af09d72b25b3fc23ee2a6a801547\"" May 8 00:49:12.229000 audit[3874]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3874 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:49:12.229000 audit[3874]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffd326f130 a2=0 a3=7fffd326f11c items=0 ppid=3616 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.229000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:49:12.229000 audit[3876]: NETFILTER_CFG table=filter:99 family=2 entries=69 op=nft_register_chain pid=3876 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:49:12.229000 audit[3876]: SYSCALL arch=c000003e syscall=46 success=yes exit=36404 a0=3 a1=7fff3ac236d0 a2=0 a3=7fff3ac236bc items=0 ppid=3616 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.229000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:49:12.235000 audit[3872]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3872 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:49:12.235000 audit[3872]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd3c1fd410 a2=0 a3=7ffd3c1fd3fc items=0 ppid=3616 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.235000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:49:12.246561 systemd[1]: Started cri-containerd-49741831dd8bdfc3df5567a7305b2252b328af09d72b25b3fc23ee2a6a801547.scope. May 8 00:49:12.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit: BPF prog-id=159 op=LOAD May 8 00:49:12.336000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3710 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439373431383331646438626466633364663535363761373330356232 May 8 00:49:12.336000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3710 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439373431383331646438626466633364663535363761373330356232 May 8 00:49:12.336000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.336000 audit: BPF prog-id=160 op=LOAD May 8 00:49:12.336000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000fbde0 items=0 ppid=3710 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439373431383331646438626466633364663535363761373330356232 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit: BPF prog-id=161 op=LOAD May 8 00:49:12.337000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000fbe28 items=0 ppid=3710 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439373431383331646438626466633364663535363761373330356232 May 8 00:49:12.337000 audit: BPF prog-id=161 op=UNLOAD May 8 00:49:12.337000 audit: BPF prog-id=160 op=UNLOAD May 8 00:49:12.337000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:12.337000 audit: BPF prog-id=162 op=LOAD May 8 00:49:12.337000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003be238 items=0 ppid=3710 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:12.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439373431383331646438626466633364663535363761373330356232 May 8 00:49:12.360820 env[1211]: time="2025-05-08T00:49:12.360728472Z" level=info msg="StartContainer for \"49741831dd8bdfc3df5567a7305b2252b328af09d72b25b3fc23ee2a6a801547\" returns successfully" May 8 00:49:12.872757 systemd-networkd[1025]: cali4fb0d3f25e5: Gained IPv6LL May 8 00:49:13.137451 kubelet[2105]: E0508 00:49:13.137319 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:13.191836 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL May 8 00:49:13.470000 audit[3924]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=3924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:13.470000 audit[3924]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff9e289410 a2=0 a3=7fff9e2893fc items=0 ppid=2250 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:13.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:13.474000 audit[3924]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=3924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:13.474000 audit[3924]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff9e289410 a2=0 a3=0 items=0 ppid=2250 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:13.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:13.481570 kubelet[2105]: I0508 00:49:13.481319 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-7cxtw" podStartSLOduration=45.481299319 podStartE2EDuration="45.481299319s" podCreationTimestamp="2025-05-08 00:48:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:49:13.244288855 +0000 UTC m=+58.457046885" watchObservedRunningTime="2025-05-08 00:49:13.481299319 +0000 UTC m=+58.694057359" May 8 00:49:13.504000 audit[3926]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:13.504000 audit[3926]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc9497e970 a2=0 a3=7ffc9497e95c items=0 ppid=2250 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:13.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:13.512000 audit[3926]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=3926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:13.512000 audit[3926]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc9497e970 a2=0 a3=7ffc9497e95c items=0 ppid=2250 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:13.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:14.139242 kubelet[2105]: E0508 00:49:14.139193 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:14.869257 env[1211]: time="2025-05-08T00:49:14.869211216Z" level=info msg="StopPodSandbox for \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\"" May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.036 [WARNING][3944] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a16f602c-d0cb-4c91-baa4-1387765ec4ad", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e", Pod:"coredns-7db6d8ff4d-7cxtw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4fb0d3f25e5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.036 [INFO][3944] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.036 [INFO][3944] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" iface="eth0" netns="" May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.036 [INFO][3944] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.036 [INFO][3944] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.069 [INFO][3959] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" HandleID="k8s-pod-network.eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.069 [INFO][3959] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.069 [INFO][3959] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.109 [WARNING][3959] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" HandleID="k8s-pod-network.eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.109 [INFO][3959] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" HandleID="k8s-pod-network.eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.111 [INFO][3959] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:15.114755 env[1211]: 2025-05-08 00:49:15.113 [INFO][3944] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:15.115267 env[1211]: time="2025-05-08T00:49:15.114814962Z" level=info msg="TearDown network for sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\" successfully" May 8 00:49:15.115267 env[1211]: time="2025-05-08T00:49:15.114857714Z" level=info msg="StopPodSandbox for \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\" returns successfully" May 8 00:49:15.115543 env[1211]: time="2025-05-08T00:49:15.115499717Z" level=info msg="RemovePodSandbox for \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\"" May 8 00:49:15.115591 env[1211]: time="2025-05-08T00:49:15.115544864Z" level=info msg="Forcibly stopping sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\"" May 8 00:49:15.141577 kubelet[2105]: E0508 00:49:15.141434 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.457 [WARNING][3982] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a16f602c-d0cb-4c91-baa4-1387765ec4ad", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"645801bc075318089b2754cb8c10f620dc41b869e71b2f35748f7183f7ab105e", Pod:"coredns-7db6d8ff4d-7cxtw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4fb0d3f25e5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.458 [INFO][3982] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.458 [INFO][3982] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" iface="eth0" netns="" May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.458 [INFO][3982] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.458 [INFO][3982] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.501 [INFO][3992] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" HandleID="k8s-pod-network.eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.501 [INFO][3992] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.501 [INFO][3992] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.513 [WARNING][3992] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" HandleID="k8s-pod-network.eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.513 [INFO][3992] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" HandleID="k8s-pod-network.eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" Workload="localhost-k8s-coredns--7db6d8ff4d--7cxtw-eth0" May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.514 [INFO][3992] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:15.517978 env[1211]: 2025-05-08 00:49:15.516 [INFO][3982] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f" May 8 00:49:15.520749 env[1211]: time="2025-05-08T00:49:15.518019335Z" level=info msg="TearDown network for sandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\" successfully" May 8 00:49:15.531249 env[1211]: time="2025-05-08T00:49:15.531205061Z" level=info msg="RemovePodSandbox \"eed45a15394a9d743ba8aa573298087f960ba5118548f558ec23fc7fb0a2721f\" returns successfully" May 8 00:49:17.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.87:22-10.0.0.1:42450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:17.093734 systemd[1]: Started sshd@17-10.0.0.87:22-10.0.0.1:42450.service. May 8 00:49:17.116744 kernel: kauditd_printk_skb: 660 callbacks suppressed May 8 00:49:17.116914 kernel: audit: type=1130 audit(1746665357.093:1226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.87:22-10.0.0.1:42450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:17.153000 audit[4002]: USER_ACCT pid=4002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.154137 sshd[4002]: Accepted publickey for core from 10.0.0.1 port 42450 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:17.158687 kernel: audit: type=1101 audit(1746665357.153:1227): pid=4002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.158000 audit[4002]: CRED_ACQ pid=4002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.159454 sshd[4002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:17.163884 systemd-logind[1192]: New session 18 of user core. May 8 00:49:17.165107 systemd[1]: Started session-18.scope. May 8 00:49:17.166507 kernel: audit: type=1103 audit(1746665357.158:1228): pid=4002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.166581 kernel: audit: type=1006 audit(1746665357.158:1229): pid=4002 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 8 00:49:17.166619 kernel: audit: type=1300 audit(1746665357.158:1229): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe930b0a70 a2=3 a3=0 items=0 ppid=1 pid=4002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:17.158000 audit[4002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe930b0a70 a2=3 a3=0 items=0 ppid=1 pid=4002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:17.158000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:17.172674 kernel: audit: type=1327 audit(1746665357.158:1229): proctitle=737368643A20636F7265205B707269765D May 8 00:49:17.172729 kernel: audit: type=1105 audit(1746665357.169:1230): pid=4002 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.169000 audit[4002]: USER_START pid=4002 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.233673 kernel: audit: type=1103 audit(1746665357.170:1231): pid=4004 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.170000 audit[4004]: CRED_ACQ pid=4004 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.319105 sshd[4002]: pam_unix(sshd:session): session closed for user core May 8 00:49:17.319000 audit[4002]: USER_END pid=4002 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.321432 systemd[1]: sshd@17-10.0.0.87:22-10.0.0.1:42450.service: Deactivated successfully. May 8 00:49:17.322189 systemd[1]: session-18.scope: Deactivated successfully. May 8 00:49:17.322926 systemd-logind[1192]: Session 18 logged out. Waiting for processes to exit. May 8 00:49:17.323700 systemd-logind[1192]: Removed session 18. May 8 00:49:17.319000 audit[4002]: CRED_DISP pid=4002 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.330059 kernel: audit: type=1106 audit(1746665357.319:1232): pid=4002 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.330185 kernel: audit: type=1104 audit(1746665357.319:1233): pid=4002 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:17.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.87:22-10.0.0.1:42450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:17.893385 env[1211]: time="2025-05-08T00:49:17.893318400Z" level=info msg="StopPodSandbox for \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\"" May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.938 [INFO][4039] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.938 [INFO][4039] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" iface="eth0" netns="/var/run/netns/cni-5999cf81-7a1f-d432-bd3e-e61b506fca0c" May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.938 [INFO][4039] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" iface="eth0" netns="/var/run/netns/cni-5999cf81-7a1f-d432-bd3e-e61b506fca0c" May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.939 [INFO][4039] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" iface="eth0" netns="/var/run/netns/cni-5999cf81-7a1f-d432-bd3e-e61b506fca0c" May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.939 [INFO][4039] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.939 [INFO][4039] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.962 [INFO][4047] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" HandleID="k8s-pod-network.25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" Workload="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.962 [INFO][4047] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.962 [INFO][4047] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.968 [WARNING][4047] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" HandleID="k8s-pod-network.25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" Workload="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.968 [INFO][4047] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" HandleID="k8s-pod-network.25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" Workload="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.970 [INFO][4047] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:17.973288 env[1211]: 2025-05-08 00:49:17.971 [INFO][4039] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4" May 8 00:49:17.973914 env[1211]: time="2025-05-08T00:49:17.973481009Z" level=info msg="TearDown network for sandbox \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\" successfully" May 8 00:49:17.973914 env[1211]: time="2025-05-08T00:49:17.973519051Z" level=info msg="StopPodSandbox for \"25f86f77ad93ef18d373be5bab0fede6b50dafbb17a7b7b5e24170b7909496d4\" returns successfully" May 8 00:49:17.974332 env[1211]: time="2025-05-08T00:49:17.974289649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bfc598f-lfzp9,Uid:5bc60802-10c5-4081-acc4-1b877ddcbd86,Namespace:calico-system,Attempt:1,}" May 8 00:49:17.975624 systemd[1]: run-netns-cni\x2d5999cf81\x2d7a1f\x2dd432\x2dbd3e\x2de61b506fca0c.mount: Deactivated successfully. May 8 00:49:18.097918 systemd-networkd[1025]: cali1f37fb99218: Link UP May 8 00:49:18.100583 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:49:18.100639 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1f37fb99218: link becomes ready May 8 00:49:18.100768 systemd-networkd[1025]: cali1f37fb99218: Gained carrier May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.026 [INFO][4055] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0 calico-kube-controllers-6bfc598f- calico-system 5bc60802-10c5-4081-acc4-1b877ddcbd86 959 0 2025-05-08 00:48:37 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6bfc598f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6bfc598f-lfzp9 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali1f37fb99218 [] []}} ContainerID="7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" Namespace="calico-system" Pod="calico-kube-controllers-6bfc598f-lfzp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.027 [INFO][4055] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" Namespace="calico-system" Pod="calico-kube-controllers-6bfc598f-lfzp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.055 [INFO][4071] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" HandleID="k8s-pod-network.7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" Workload="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.064 [INFO][4071] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" HandleID="k8s-pod-network.7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" Workload="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dc150), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6bfc598f-lfzp9", "timestamp":"2025-05-08 00:49:18.055186017 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.064 [INFO][4071] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.064 [INFO][4071] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.064 [INFO][4071] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.066 [INFO][4071] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" host="localhost" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.073 [INFO][4071] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.078 [INFO][4071] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.079 [INFO][4071] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.081 [INFO][4071] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.081 [INFO][4071] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" host="localhost" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.083 [INFO][4071] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3 May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.088 [INFO][4071] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" host="localhost" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.093 [INFO][4071] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" host="localhost" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.093 [INFO][4071] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" host="localhost" May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.093 [INFO][4071] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:18.113394 env[1211]: 2025-05-08 00:49:18.093 [INFO][4071] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" HandleID="k8s-pod-network.7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" Workload="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" May 8 00:49:18.114204 env[1211]: 2025-05-08 00:49:18.095 [INFO][4055] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" Namespace="calico-system" Pod="calico-kube-controllers-6bfc598f-lfzp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0", GenerateName:"calico-kube-controllers-6bfc598f-", Namespace:"calico-system", SelfLink:"", UID:"5bc60802-10c5-4081-acc4-1b877ddcbd86", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bfc598f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6bfc598f-lfzp9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1f37fb99218", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:18.114204 env[1211]: 2025-05-08 00:49:18.095 [INFO][4055] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" Namespace="calico-system" Pod="calico-kube-controllers-6bfc598f-lfzp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" May 8 00:49:18.114204 env[1211]: 2025-05-08 00:49:18.095 [INFO][4055] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1f37fb99218 ContainerID="7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" Namespace="calico-system" Pod="calico-kube-controllers-6bfc598f-lfzp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" May 8 00:49:18.114204 env[1211]: 2025-05-08 00:49:18.101 [INFO][4055] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" Namespace="calico-system" Pod="calico-kube-controllers-6bfc598f-lfzp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" May 8 00:49:18.114204 env[1211]: 2025-05-08 00:49:18.101 [INFO][4055] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" Namespace="calico-system" Pod="calico-kube-controllers-6bfc598f-lfzp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0", GenerateName:"calico-kube-controllers-6bfc598f-", Namespace:"calico-system", SelfLink:"", UID:"5bc60802-10c5-4081-acc4-1b877ddcbd86", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bfc598f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3", Pod:"calico-kube-controllers-6bfc598f-lfzp9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1f37fb99218", MAC:"42:e7:33:99:b3:76", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:18.114204 env[1211]: 2025-05-08 00:49:18.111 [INFO][4055] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3" Namespace="calico-system" Pod="calico-kube-controllers-6bfc598f-lfzp9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bfc598f--lfzp9-eth0" May 8 00:49:18.121000 audit[4095]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=4095 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:49:18.121000 audit[4095]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff927ef6d0 a2=0 a3=7fff927ef6bc items=0 ppid=3616 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:18.121000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:49:18.125579 env[1211]: time="2025-05-08T00:49:18.125485488Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:49:18.125579 env[1211]: time="2025-05-08T00:49:18.125528530Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:49:18.125579 env[1211]: time="2025-05-08T00:49:18.125538830Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:49:18.125786 env[1211]: time="2025-05-08T00:49:18.125748850Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3 pid=4104 runtime=io.containerd.runc.v2 May 8 00:49:18.146067 systemd[1]: Started cri-containerd-7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3.scope. May 8 00:49:18.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.156000 audit: BPF prog-id=163 op=LOAD May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4104 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:18.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761396236653833626237666632396338373438666637323863626161 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4104 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:18.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761396236653833626237666632396338373438666637323863626161 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit: BPF prog-id=164 op=LOAD May 8 00:49:18.157000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00036a000 items=0 ppid=4104 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:18.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761396236653833626237666632396338373438666637323863626161 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit: BPF prog-id=165 op=LOAD May 8 00:49:18.157000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00036a048 items=0 ppid=4104 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:18.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761396236653833626237666632396338373438666637323863626161 May 8 00:49:18.157000 audit: BPF prog-id=165 op=UNLOAD May 8 00:49:18.157000 audit: BPF prog-id=164 op=UNLOAD May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:18.157000 audit: BPF prog-id=166 op=LOAD May 8 00:49:18.157000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00036a458 items=0 ppid=4104 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:18.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761396236653833626237666632396338373438666637323863626161 May 8 00:49:18.158889 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:49:18.182187 env[1211]: time="2025-05-08T00:49:18.182120791Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bfc598f-lfzp9,Uid:5bc60802-10c5-4081-acc4-1b877ddcbd86,Namespace:calico-system,Attempt:1,} returns sandbox id \"7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3\"" May 8 00:49:18.184396 env[1211]: time="2025-05-08T00:49:18.184357821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 8 00:49:19.719362 systemd-networkd[1025]: cali1f37fb99218: Gained IPv6LL May 8 00:49:20.893436 env[1211]: time="2025-05-08T00:49:20.893366623Z" level=info msg="StopPodSandbox for \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\"" May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.034 [INFO][4155] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.035 [INFO][4155] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" iface="eth0" netns="/var/run/netns/cni-58d145c9-3107-22ee-ddc0-56d5c67afd95" May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.035 [INFO][4155] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" iface="eth0" netns="/var/run/netns/cni-58d145c9-3107-22ee-ddc0-56d5c67afd95" May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.035 [INFO][4155] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" iface="eth0" netns="/var/run/netns/cni-58d145c9-3107-22ee-ddc0-56d5c67afd95" May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.035 [INFO][4155] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.035 [INFO][4155] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.071 [INFO][4164] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" HandleID="k8s-pod-network.f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.071 [INFO][4164] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.071 [INFO][4164] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.077 [WARNING][4164] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" HandleID="k8s-pod-network.f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.078 [INFO][4164] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" HandleID="k8s-pod-network.f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.080 [INFO][4164] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:21.083720 env[1211]: 2025-05-08 00:49:21.082 [INFO][4155] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285" May 8 00:49:21.084177 env[1211]: time="2025-05-08T00:49:21.083871976Z" level=info msg="TearDown network for sandbox \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\" successfully" May 8 00:49:21.084177 env[1211]: time="2025-05-08T00:49:21.083918093Z" level=info msg="StopPodSandbox for \"f57167b0b48f03ce53f6f785da7bc90eaacd10cd7dbba30f83ac4a2053a18285\" returns successfully" May 8 00:49:21.084803 env[1211]: time="2025-05-08T00:49:21.084776837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59c4d76dbf-sk59c,Uid:4fc668bb-3c8a-4b79-b500-98d947cbaed8,Namespace:calico-apiserver,Attempt:1,}" May 8 00:49:21.086320 systemd[1]: run-netns-cni\x2d58d145c9\x2d3107\x2d22ee\x2dddc0\x2d56d5c67afd95.mount: Deactivated successfully. May 8 00:49:21.893981 env[1211]: time="2025-05-08T00:49:21.893911013Z" level=info msg="StopPodSandbox for \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\"" May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.109 [INFO][4188] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.109 [INFO][4188] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" iface="eth0" netns="/var/run/netns/cni-7d77bfbf-f7a2-3335-ec0b-5d3fdf3d496c" May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.109 [INFO][4188] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" iface="eth0" netns="/var/run/netns/cni-7d77bfbf-f7a2-3335-ec0b-5d3fdf3d496c" May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.111 [INFO][4188] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" iface="eth0" netns="/var/run/netns/cni-7d77bfbf-f7a2-3335-ec0b-5d3fdf3d496c" May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.111 [INFO][4188] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.111 [INFO][4188] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.185 [INFO][4197] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" HandleID="k8s-pod-network.5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" Workload="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.185 [INFO][4197] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.185 [INFO][4197] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.199 [WARNING][4197] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" HandleID="k8s-pod-network.5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" Workload="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.199 [INFO][4197] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" HandleID="k8s-pod-network.5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" Workload="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.201 [INFO][4197] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:22.206470 env[1211]: 2025-05-08 00:49:22.204 [INFO][4188] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae" May 8 00:49:22.209234 systemd[1]: run-netns-cni\x2d7d77bfbf\x2df7a2\x2d3335\x2dec0b\x2d5d3fdf3d496c.mount: Deactivated successfully. May 8 00:49:22.210623 env[1211]: time="2025-05-08T00:49:22.210555607Z" level=info msg="TearDown network for sandbox \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\" successfully" May 8 00:49:22.210623 env[1211]: time="2025-05-08T00:49:22.210601605Z" level=info msg="StopPodSandbox for \"5c6b60d711f9d8a0a25bf89cfb2722f24a71b71f32b52e0cd106d7e1fbebebae\" returns successfully" May 8 00:49:22.211106 kubelet[2105]: E0508 00:49:22.211072 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:22.212885 env[1211]: time="2025-05-08T00:49:22.212855280Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bq7kp,Uid:2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f,Namespace:kube-system,Attempt:1,}" May 8 00:49:22.325553 systemd[1]: Started sshd@18-10.0.0.87:22-10.0.0.1:42464.service. May 8 00:49:22.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.87:22-10.0.0.1:42464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:22.326857 kernel: kauditd_printk_skb: 61 callbacks suppressed May 8 00:49:22.326906 kernel: audit: type=1130 audit(1746665362.325:1254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.87:22-10.0.0.1:42464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:22.387000 audit[4211]: USER_ACCT pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.393154 sshd[4211]: Accepted publickey for core from 10.0.0.1 port 42464 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:22.392000 audit[4211]: CRED_ACQ pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.393684 kernel: audit: type=1101 audit(1746665362.387:1255): pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.393729 kernel: audit: type=1103 audit(1746665362.392:1256): pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.393806 sshd[4211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:22.400175 kernel: audit: type=1006 audit(1746665362.392:1257): pid=4211 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 8 00:49:22.400262 kernel: audit: type=1300 audit(1746665362.392:1257): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb53b1ed0 a2=3 a3=0 items=0 ppid=1 pid=4211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:22.392000 audit[4211]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb53b1ed0 a2=3 a3=0 items=0 ppid=1 pid=4211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:22.403458 systemd-logind[1192]: New session 19 of user core. May 8 00:49:22.403822 systemd[1]: Started session-19.scope. May 8 00:49:22.404353 kernel: audit: type=1327 audit(1746665362.392:1257): proctitle=737368643A20636F7265205B707269765D May 8 00:49:22.392000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:22.417738 kernel: audit: type=1105 audit(1746665362.411:1258): pid=4211 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.411000 audit[4211]: USER_START pid=4211 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.417000 audit[4213]: CRED_ACQ pid=4213 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.448703 kernel: audit: type=1103 audit(1746665362.417:1259): pid=4213 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.798469 sshd[4211]: pam_unix(sshd:session): session closed for user core May 8 00:49:22.799000 audit[4211]: USER_END pid=4211 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.801321 systemd[1]: sshd@18-10.0.0.87:22-10.0.0.1:42464.service: Deactivated successfully. May 8 00:49:22.802330 systemd[1]: session-19.scope: Deactivated successfully. May 8 00:49:22.802455 systemd-logind[1192]: Session 19 logged out. Waiting for processes to exit. May 8 00:49:22.803503 systemd-logind[1192]: Removed session 19. May 8 00:49:22.799000 audit[4211]: CRED_DISP pid=4211 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.819296 kernel: audit: type=1106 audit(1746665362.799:1260): pid=4211 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.819408 kernel: audit: type=1104 audit(1746665362.799:1261): pid=4211 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:22.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.87:22-10.0.0.1:42464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:23.393761 systemd-networkd[1025]: caliace63482245: Link UP May 8 00:49:23.396135 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:49:23.396205 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliace63482245: link becomes ready May 8 00:49:23.396346 systemd-networkd[1025]: caliace63482245: Gained carrier May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.837 [INFO][4223] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0 calico-apiserver-59c4d76dbf- calico-apiserver 4fc668bb-3c8a-4b79-b500-98d947cbaed8 971 0 2025-05-08 00:48:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:59c4d76dbf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-59c4d76dbf-sk59c eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliace63482245 [] []}} ContainerID="6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-sk59c" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.837 [INFO][4223] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-sk59c" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.865 [INFO][4239] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" HandleID="k8s-pod-network.6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.874 [INFO][4239] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" HandleID="k8s-pod-network.6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030d950), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-59c4d76dbf-sk59c", "timestamp":"2025-05-08 00:49:22.865796024 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.874 [INFO][4239] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.874 [INFO][4239] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.874 [INFO][4239] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.875 [INFO][4239] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" host="localhost" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.879 [INFO][4239] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.884 [INFO][4239] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.886 [INFO][4239] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.888 [INFO][4239] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.888 [INFO][4239] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" host="localhost" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:22.999 [INFO][4239] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:23.200 [INFO][4239] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" host="localhost" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:23.389 [INFO][4239] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" host="localhost" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:23.389 [INFO][4239] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" host="localhost" May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:23.389 [INFO][4239] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:23.470610 env[1211]: 2025-05-08 00:49:23.389 [INFO][4239] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" HandleID="k8s-pod-network.6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" May 8 00:49:23.471454 env[1211]: 2025-05-08 00:49:23.391 [INFO][4223] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-sk59c" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0", GenerateName:"calico-apiserver-59c4d76dbf-", Namespace:"calico-apiserver", SelfLink:"", UID:"4fc668bb-3c8a-4b79-b500-98d947cbaed8", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59c4d76dbf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-59c4d76dbf-sk59c", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliace63482245", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:23.471454 env[1211]: 2025-05-08 00:49:23.391 [INFO][4223] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-sk59c" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" May 8 00:49:23.471454 env[1211]: 2025-05-08 00:49:23.391 [INFO][4223] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliace63482245 ContainerID="6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-sk59c" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" May 8 00:49:23.471454 env[1211]: 2025-05-08 00:49:23.396 [INFO][4223] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-sk59c" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" May 8 00:49:23.471454 env[1211]: 2025-05-08 00:49:23.396 [INFO][4223] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-sk59c" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0", GenerateName:"calico-apiserver-59c4d76dbf-", Namespace:"calico-apiserver", SelfLink:"", UID:"4fc668bb-3c8a-4b79-b500-98d947cbaed8", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59c4d76dbf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f", Pod:"calico-apiserver-59c4d76dbf-sk59c", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliace63482245", MAC:"7e:76:85:ba:bb:66", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:23.471454 env[1211]: 2025-05-08 00:49:23.468 [INFO][4223] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-sk59c" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--sk59c-eth0" May 8 00:49:23.480000 audit[4265]: NETFILTER_CFG table=filter:106 family=2 entries=48 op=nft_register_chain pid=4265 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:49:23.480000 audit[4265]: SYSCALL arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7ffd7e702490 a2=0 a3=7ffd7e70247c items=0 ppid=3616 pid=4265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:23.480000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:49:23.529571 env[1211]: time="2025-05-08T00:49:23.529441025Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:49:23.529571 env[1211]: time="2025-05-08T00:49:23.529489828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:49:23.529571 env[1211]: time="2025-05-08T00:49:23.529504105Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:49:23.529855 env[1211]: time="2025-05-08T00:49:23.529672876Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f pid=4273 runtime=io.containerd.runc.v2 May 8 00:49:23.548503 systemd[1]: run-containerd-runc-k8s.io-6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f-runc.SgBPaC.mount: Deactivated successfully. May 8 00:49:23.551805 systemd[1]: Started cri-containerd-6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f.scope. May 8 00:49:23.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit: BPF prog-id=167 op=LOAD May 8 00:49:23.561000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4273 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:23.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630383538343961646364343461363534373263313330346661663734 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4273 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:23.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630383538343961646364343461363534373263313330346661663734 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit: BPF prog-id=168 op=LOAD May 8 00:49:23.561000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028cd50 items=0 ppid=4273 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:23.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630383538343961646364343461363534373263313330346661663734 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.561000 audit: BPF prog-id=169 op=LOAD May 8 00:49:23.561000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028cd98 items=0 ppid=4273 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:23.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630383538343961646364343461363534373263313330346661663734 May 8 00:49:23.562000 audit: BPF prog-id=169 op=UNLOAD May 8 00:49:23.562000 audit: BPF prog-id=168 op=UNLOAD May 8 00:49:23.562000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.562000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.562000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.562000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.562000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.562000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.562000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.562000 audit[4283]: AVC avc: denied { perfmon } for pid=4283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.562000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.562000 audit[4283]: AVC avc: denied { bpf } for pid=4283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:23.562000 audit: BPF prog-id=170 op=LOAD May 8 00:49:23.562000 audit[4283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028d1a8 items=0 ppid=4273 pid=4283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:23.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630383538343961646364343461363534373263313330346661663734 May 8 00:49:23.563471 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:49:23.588345 env[1211]: time="2025-05-08T00:49:23.586544777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59c4d76dbf-sk59c,Uid:4fc668bb-3c8a-4b79-b500-98d947cbaed8,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f\"" May 8 00:49:23.722920 env[1211]: time="2025-05-08T00:49:23.720747761Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:23.893312 env[1211]: time="2025-05-08T00:49:23.893235081Z" level=info msg="StopPodSandbox for \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\"" May 8 00:49:24.015435 env[1211]: time="2025-05-08T00:49:24.015365969Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:24.061707 env[1211]: time="2025-05-08T00:49:24.061639797Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:24.154701 env[1211]: time="2025-05-08T00:49:24.154634611Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 8 00:49:24.155004 env[1211]: time="2025-05-08T00:49:24.154965631Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:24.157124 env[1211]: time="2025-05-08T00:49:24.157076412Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:49:24.163121 env[1211]: time="2025-05-08T00:49:24.163057218Z" level=info msg="CreateContainer within sandbox \"7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.120 [INFO][4334] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.120 [INFO][4334] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" iface="eth0" netns="/var/run/netns/cni-c002e382-c506-fe55-cd87-1cd9f2489d80" May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.121 [INFO][4334] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" iface="eth0" netns="/var/run/netns/cni-c002e382-c506-fe55-cd87-1cd9f2489d80" May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.121 [INFO][4334] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" iface="eth0" netns="/var/run/netns/cni-c002e382-c506-fe55-cd87-1cd9f2489d80" May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.121 [INFO][4334] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.121 [INFO][4334] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.154 [INFO][4344] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" HandleID="k8s-pod-network.6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.154 [INFO][4344] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.155 [INFO][4344] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.197 [WARNING][4344] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" HandleID="k8s-pod-network.6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.197 [INFO][4344] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" HandleID="k8s-pod-network.6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.199 [INFO][4344] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:24.203023 env[1211]: 2025-05-08 00:49:24.201 [INFO][4334] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e" May 8 00:49:24.203727 env[1211]: time="2025-05-08T00:49:24.203171630Z" level=info msg="TearDown network for sandbox \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\" successfully" May 8 00:49:24.203727 env[1211]: time="2025-05-08T00:49:24.203223178Z" level=info msg="StopPodSandbox for \"6b7eef18370edfb29b97529e5616e6567dfb74d81e16cc761e752927aae2fd6e\" returns successfully" May 8 00:49:24.204124 env[1211]: time="2025-05-08T00:49:24.204092710Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59c4d76dbf-zzmgd,Uid:eece7c19-430f-4e6b-b277-95661b0e90ab,Namespace:calico-apiserver,Attempt:1,}" May 8 00:49:24.267666 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4a01b70f18d: link becomes ready May 8 00:49:24.267435 systemd-networkd[1025]: cali4a01b70f18d: Link UP May 8 00:49:24.267743 systemd-networkd[1025]: cali4a01b70f18d: Gained carrier May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.081 [INFO][4305] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0 coredns-7db6d8ff4d- kube-system 2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f 978 0 2025-05-08 00:48:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-bq7kp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4a01b70f18d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bq7kp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bq7kp-" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.081 [INFO][4305] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bq7kp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.144 [INFO][4346] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" HandleID="k8s-pod-network.b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" Workload="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.157 [INFO][4346] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" HandleID="k8s-pod-network.b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" Workload="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003bfa10), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-bq7kp", "timestamp":"2025-05-08 00:49:24.144099781 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.157 [INFO][4346] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.200 [INFO][4346] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.200 [INFO][4346] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.203 [INFO][4346] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" host="localhost" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.209 [INFO][4346] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.216 [INFO][4346] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.219 [INFO][4346] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.223 [INFO][4346] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.223 [INFO][4346] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" host="localhost" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.225 [INFO][4346] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.238 [INFO][4346] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" host="localhost" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.254 [INFO][4346] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" host="localhost" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.254 [INFO][4346] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" host="localhost" May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.254 [INFO][4346] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:24.298004 env[1211]: 2025-05-08 00:49:24.254 [INFO][4346] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" HandleID="k8s-pod-network.b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" Workload="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" May 8 00:49:24.299689 env[1211]: 2025-05-08 00:49:24.257 [INFO][4305] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bq7kp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-bq7kp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4a01b70f18d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:24.299689 env[1211]: 2025-05-08 00:49:24.257 [INFO][4305] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bq7kp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" May 8 00:49:24.299689 env[1211]: 2025-05-08 00:49:24.257 [INFO][4305] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4a01b70f18d ContainerID="b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bq7kp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" May 8 00:49:24.299689 env[1211]: 2025-05-08 00:49:24.274 [INFO][4305] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bq7kp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" May 8 00:49:24.299689 env[1211]: 2025-05-08 00:49:24.274 [INFO][4305] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bq7kp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d", Pod:"coredns-7db6d8ff4d-bq7kp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4a01b70f18d", MAC:"8a:1c:90:c3:ab:d8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:24.299689 env[1211]: 2025-05-08 00:49:24.295 [INFO][4305] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bq7kp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bq7kp-eth0" May 8 00:49:24.305217 env[1211]: time="2025-05-08T00:49:24.305135880Z" level=info msg="CreateContainer within sandbox \"7a9b6e83bb7ff29c8748ff728cbaa923f12fa33a0c02e9265fbea87be99422b3\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"65189225911019892a59ab6ed90569c203a883725a83b3e8a656b2b50c6e7b21\"" May 8 00:49:24.306243 env[1211]: time="2025-05-08T00:49:24.306187799Z" level=info msg="StartContainer for \"65189225911019892a59ab6ed90569c203a883725a83b3e8a656b2b50c6e7b21\"" May 8 00:49:24.318000 audit[4385]: NETFILTER_CFG table=filter:107 family=2 entries=44 op=nft_register_chain pid=4385 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:49:24.318000 audit[4385]: SYSCALL arch=c000003e syscall=46 success=yes exit=22260 a0=3 a1=7ffe58afc670 a2=0 a3=7ffe58afc65c items=0 ppid=3616 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.318000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:49:24.326271 env[1211]: time="2025-05-08T00:49:24.326172879Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:49:24.326271 env[1211]: time="2025-05-08T00:49:24.326277146Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:49:24.326515 env[1211]: time="2025-05-08T00:49:24.326301874Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:49:24.326698 env[1211]: time="2025-05-08T00:49:24.326628374Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d pid=4410 runtime=io.containerd.runc.v2 May 8 00:49:24.330892 systemd[1]: Started cri-containerd-65189225911019892a59ab6ed90569c203a883725a83b3e8a656b2b50c6e7b21.scope. May 8 00:49:24.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.351000 audit: BPF prog-id=171 op=LOAD May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4104 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313839323235393131303139383932613539616236656439303536 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4104 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313839323235393131303139383932613539616236656439303536 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit: BPF prog-id=172 op=LOAD May 8 00:49:24.352000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000406080 items=0 ppid=4104 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313839323235393131303139383932613539616236656439303536 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit: BPF prog-id=173 op=LOAD May 8 00:49:24.352000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0004060c8 items=0 ppid=4104 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313839323235393131303139383932613539616236656439303536 May 8 00:49:24.352000 audit: BPF prog-id=173 op=UNLOAD May 8 00:49:24.352000 audit: BPF prog-id=172 op=UNLOAD May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.352000 audit: BPF prog-id=174 op=LOAD May 8 00:49:24.352000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0004064d8 items=0 ppid=4104 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635313839323235393131303139383932613539616236656439303536 May 8 00:49:24.362242 systemd[1]: Started cri-containerd-b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d.scope. May 8 00:49:24.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit: BPF prog-id=175 op=LOAD May 8 00:49:24.378000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4410 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316462303362663031383532666230353536626233373135656361 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4410 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316462303362663031383532666230353536626233373135656361 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit: BPF prog-id=176 op=LOAD May 8 00:49:24.378000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000383e90 items=0 ppid=4410 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316462303362663031383532666230353536626233373135656361 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.378000 audit: BPF prog-id=177 op=LOAD May 8 00:49:24.378000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000383ed8 items=0 ppid=4410 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316462303362663031383532666230353536626233373135656361 May 8 00:49:24.379000 audit: BPF prog-id=177 op=UNLOAD May 8 00:49:24.379000 audit: BPF prog-id=176 op=UNLOAD May 8 00:49:24.379000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.379000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.379000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.379000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.379000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.379000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.379000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.379000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.379000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.379000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.379000 audit: BPF prog-id=178 op=LOAD May 8 00:49:24.379000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f62e8 items=0 ppid=4410 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316462303362663031383532666230353536626233373135656361 May 8 00:49:24.380821 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:49:24.392349 env[1211]: time="2025-05-08T00:49:24.392278454Z" level=info msg="StartContainer for \"65189225911019892a59ab6ed90569c203a883725a83b3e8a656b2b50c6e7b21\" returns successfully" May 8 00:49:24.411600 env[1211]: time="2025-05-08T00:49:24.411544637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bq7kp,Uid:2cdc3a94-9ecf-4d94-b57b-0f72cb67f85f,Namespace:kube-system,Attempt:1,} returns sandbox id \"b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d\"" May 8 00:49:24.414765 kubelet[2105]: E0508 00:49:24.412381 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:24.416466 env[1211]: time="2025-05-08T00:49:24.414223578Z" level=info msg="CreateContainer within sandbox \"b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:49:24.441861 env[1211]: time="2025-05-08T00:49:24.441793040Z" level=info msg="CreateContainer within sandbox \"b31db03bf01852fb0556bb3715eca345e7d4f0dbe09348454dd48d0d90724d1d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1b1007ad4e2615d5ee2037e2291ab06e80934d12a4a0c383b9b5f55e0fd672fc\"" May 8 00:49:24.442706 env[1211]: time="2025-05-08T00:49:24.442673052Z" level=info msg="StartContainer for \"1b1007ad4e2615d5ee2037e2291ab06e80934d12a4a0c383b9b5f55e0fd672fc\"" May 8 00:49:24.469816 systemd[1]: Started cri-containerd-1b1007ad4e2615d5ee2037e2291ab06e80934d12a4a0c383b9b5f55e0fd672fc.scope. May 8 00:49:24.478366 systemd-networkd[1025]: cali599509b4e4f: Link UP May 8 00:49:24.482769 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:49:24.482837 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali599509b4e4f: link becomes ready May 8 00:49:24.484461 systemd-networkd[1025]: cali599509b4e4f: Gained carrier May 8 00:49:24.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.489000 audit: BPF prog-id=179 op=LOAD May 8 00:49:24.490000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.490000 audit[4486]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4410 pid=4486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313030376164346532363135643565653230333765323239316162 May 8 00:49:24.491000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.491000 audit[4486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4410 pid=4486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313030376164346532363135643565653230333765323239316162 May 8 00:49:24.491000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.491000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.491000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.491000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.491000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.491000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.491000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.491000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.491000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.491000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.491000 audit: BPF prog-id=180 op=LOAD May 8 00:49:24.491000 audit[4486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00036cc00 items=0 ppid=4410 pid=4486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313030376164346532363135643565653230333765323239316162 May 8 00:49:24.492000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.492000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.492000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.492000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.492000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.492000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.492000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.492000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.492000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.492000 audit: BPF prog-id=181 op=LOAD May 8 00:49:24.492000 audit[4486]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00036cc48 items=0 ppid=4410 pid=4486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313030376164346532363135643565653230333765323239316162 May 8 00:49:24.493000 audit: BPF prog-id=181 op=UNLOAD May 8 00:49:24.493000 audit: BPF prog-id=180 op=UNLOAD May 8 00:49:24.493000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.493000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.493000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.493000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.493000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.493000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.493000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.493000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.493000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.493000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.493000 audit: BPF prog-id=182 op=LOAD May 8 00:49:24.493000 audit[4486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00036d058 items=0 ppid=4410 pid=4486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162313030376164346532363135643565653230333765323239316162 May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.361 [INFO][4381] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0 calico-apiserver-59c4d76dbf- calico-apiserver eece7c19-430f-4e6b-b277-95661b0e90ab 994 0 2025-05-08 00:48:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:59c4d76dbf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-59c4d76dbf-zzmgd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali599509b4e4f [] []}} ContainerID="ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-zzmgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.361 [INFO][4381] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-zzmgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.409 [INFO][4459] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" HandleID="k8s-pod-network.ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.424 [INFO][4459] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" HandleID="k8s-pod-network.ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000334d40), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-59c4d76dbf-zzmgd", "timestamp":"2025-05-08 00:49:24.409418377 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.424 [INFO][4459] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.424 [INFO][4459] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.424 [INFO][4459] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.427 [INFO][4459] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" host="localhost" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.431 [INFO][4459] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.437 [INFO][4459] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.439 [INFO][4459] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.442 [INFO][4459] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.442 [INFO][4459] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" host="localhost" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.445 [INFO][4459] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.450 [INFO][4459] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" host="localhost" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.467 [INFO][4459] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" host="localhost" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.468 [INFO][4459] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" host="localhost" May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.468 [INFO][4459] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:24.506333 env[1211]: 2025-05-08 00:49:24.468 [INFO][4459] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" HandleID="k8s-pod-network.ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" Workload="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" May 8 00:49:24.507423 env[1211]: 2025-05-08 00:49:24.473 [INFO][4381] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-zzmgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0", GenerateName:"calico-apiserver-59c4d76dbf-", Namespace:"calico-apiserver", SelfLink:"", UID:"eece7c19-430f-4e6b-b277-95661b0e90ab", ResourceVersion:"994", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59c4d76dbf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-59c4d76dbf-zzmgd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali599509b4e4f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:24.507423 env[1211]: 2025-05-08 00:49:24.474 [INFO][4381] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-zzmgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" May 8 00:49:24.507423 env[1211]: 2025-05-08 00:49:24.474 [INFO][4381] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali599509b4e4f ContainerID="ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-zzmgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" May 8 00:49:24.507423 env[1211]: 2025-05-08 00:49:24.488 [INFO][4381] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-zzmgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" May 8 00:49:24.507423 env[1211]: 2025-05-08 00:49:24.491 [INFO][4381] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-zzmgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0", GenerateName:"calico-apiserver-59c4d76dbf-", Namespace:"calico-apiserver", SelfLink:"", UID:"eece7c19-430f-4e6b-b277-95661b0e90ab", ResourceVersion:"994", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59c4d76dbf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c", Pod:"calico-apiserver-59c4d76dbf-zzmgd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali599509b4e4f", MAC:"56:0a:cc:7c:47:f1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:24.507423 env[1211]: 2025-05-08 00:49:24.504 [INFO][4381] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c" Namespace="calico-apiserver" Pod="calico-apiserver-59c4d76dbf-zzmgd" WorkloadEndpoint="localhost-k8s-calico--apiserver--59c4d76dbf--zzmgd-eth0" May 8 00:49:24.519770 systemd-networkd[1025]: caliace63482245: Gained IPv6LL May 8 00:49:24.527841 env[1211]: time="2025-05-08T00:49:24.527774187Z" level=info msg="StartContainer for \"1b1007ad4e2615d5ee2037e2291ab06e80934d12a4a0c383b9b5f55e0fd672fc\" returns successfully" May 8 00:49:24.529000 audit[4531]: NETFILTER_CFG table=filter:108 family=2 entries=42 op=nft_register_chain pid=4531 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:49:24.529000 audit[4531]: SYSCALL arch=c000003e syscall=46 success=yes exit=22688 a0=3 a1=7ffcb734f2c0 a2=0 a3=7ffcb734f2ac items=0 ppid=3616 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.529000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:49:24.537903 systemd[1]: run-netns-cni\x2dc002e382\x2dc506\x2dfe55\x2dcd87\x2d1cd9f2489d80.mount: Deactivated successfully. May 8 00:49:24.538351 env[1211]: time="2025-05-08T00:49:24.536960524Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:49:24.538351 env[1211]: time="2025-05-08T00:49:24.537004408Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:49:24.538351 env[1211]: time="2025-05-08T00:49:24.537018945Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:49:24.538351 env[1211]: time="2025-05-08T00:49:24.537123504Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c pid=4542 runtime=io.containerd.runc.v2 May 8 00:49:24.555327 systemd[1]: Started cri-containerd-ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c.scope. May 8 00:49:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.573000 audit: BPF prog-id=183 op=LOAD May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4542 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666306361323634636366633963656165633430646566393966613565 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4542 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666306361323634636366633963656165633430646566393966613565 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit: BPF prog-id=184 op=LOAD May 8 00:49:24.574000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00030f050 items=0 ppid=4542 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666306361323634636366633963656165633430646566393966613565 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit: BPF prog-id=185 op=LOAD May 8 00:49:24.574000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00030f098 items=0 ppid=4542 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666306361323634636366633963656165633430646566393966613565 May 8 00:49:24.574000 audit: BPF prog-id=185 op=UNLOAD May 8 00:49:24.574000 audit: BPF prog-id=184 op=UNLOAD May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:24.574000 audit: BPF prog-id=186 op=LOAD May 8 00:49:24.574000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00030f4a8 items=0 ppid=4542 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:24.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666306361323634636366633963656165633430646566393966613565 May 8 00:49:24.576313 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:49:24.602641 env[1211]: time="2025-05-08T00:49:24.602588632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59c4d76dbf-zzmgd,Uid:eece7c19-430f-4e6b-b277-95661b0e90ab,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c\"" May 8 00:49:24.893770 env[1211]: time="2025-05-08T00:49:24.893613869Z" level=info msg="StopPodSandbox for \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\"" May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.944 [INFO][4594] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.944 [INFO][4594] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" iface="eth0" netns="/var/run/netns/cni-72e7d601-ff9d-04a2-05aa-0e21a6674c41" May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.944 [INFO][4594] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" iface="eth0" netns="/var/run/netns/cni-72e7d601-ff9d-04a2-05aa-0e21a6674c41" May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.945 [INFO][4594] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" iface="eth0" netns="/var/run/netns/cni-72e7d601-ff9d-04a2-05aa-0e21a6674c41" May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.945 [INFO][4594] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.945 [INFO][4594] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.969 [INFO][4602] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" HandleID="k8s-pod-network.669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" Workload="localhost-k8s-csi--node--driver--k7qpk-eth0" May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.970 [INFO][4602] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.970 [INFO][4602] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.976 [WARNING][4602] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" HandleID="k8s-pod-network.669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" Workload="localhost-k8s-csi--node--driver--k7qpk-eth0" May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.976 [INFO][4602] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" HandleID="k8s-pod-network.669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" Workload="localhost-k8s-csi--node--driver--k7qpk-eth0" May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.978 [INFO][4602] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:24.982781 env[1211]: 2025-05-08 00:49:24.980 [INFO][4594] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7" May 8 00:49:24.983390 env[1211]: time="2025-05-08T00:49:24.982962034Z" level=info msg="TearDown network for sandbox \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\" successfully" May 8 00:49:24.983390 env[1211]: time="2025-05-08T00:49:24.983015235Z" level=info msg="StopPodSandbox for \"669c5a099f17391764d2a718c26bb142503dd18f83d7416210b3d36428725fb7\" returns successfully" May 8 00:49:24.985146 env[1211]: time="2025-05-08T00:49:24.985071964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k7qpk,Uid:95af3a69-e90f-40a0-a3a8-e84fbf9772e8,Namespace:calico-system,Attempt:1,}" May 8 00:49:24.987082 systemd[1]: run-netns-cni\x2d72e7d601\x2dff9d\x2d04a2\x2d05aa\x2d0e21a6674c41.mount: Deactivated successfully. May 8 00:49:25.121707 systemd-networkd[1025]: calia8f81a679a7: Link UP May 8 00:49:25.123894 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia8f81a679a7: link becomes ready May 8 00:49:25.123907 systemd-networkd[1025]: calia8f81a679a7: Gained carrier May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.035 [INFO][4609] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--k7qpk-eth0 csi-node-driver- calico-system 95af3a69-e90f-40a0-a3a8-e84fbf9772e8 1014 0 2025-05-08 00:48:37 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-k7qpk eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calia8f81a679a7 [] []}} ContainerID="04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" Namespace="calico-system" Pod="csi-node-driver-k7qpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--k7qpk-" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.035 [INFO][4609] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" Namespace="calico-system" Pod="csi-node-driver-k7qpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--k7qpk-eth0" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.075 [INFO][4623] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" HandleID="k8s-pod-network.04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" Workload="localhost-k8s-csi--node--driver--k7qpk-eth0" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.084 [INFO][4623] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" HandleID="k8s-pod-network.04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" Workload="localhost-k8s-csi--node--driver--k7qpk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000309840), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-k7qpk", "timestamp":"2025-05-08 00:49:25.075915839 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.085 [INFO][4623] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.085 [INFO][4623] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.085 [INFO][4623] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.086 [INFO][4623] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" host="localhost" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.092 [INFO][4623] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.097 [INFO][4623] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.100 [INFO][4623] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.103 [INFO][4623] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.103 [INFO][4623] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" host="localhost" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.104 [INFO][4623] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9 May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.110 [INFO][4623] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" host="localhost" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.116 [INFO][4623] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" host="localhost" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.116 [INFO][4623] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" host="localhost" May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.116 [INFO][4623] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:49:25.139601 env[1211]: 2025-05-08 00:49:25.116 [INFO][4623] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" HandleID="k8s-pod-network.04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" Workload="localhost-k8s-csi--node--driver--k7qpk-eth0" May 8 00:49:25.140393 env[1211]: 2025-05-08 00:49:25.119 [INFO][4609] cni-plugin/k8s.go 386: Populated endpoint ContainerID="04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" Namespace="calico-system" Pod="csi-node-driver-k7qpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--k7qpk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--k7qpk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"95af3a69-e90f-40a0-a3a8-e84fbf9772e8", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-k7qpk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia8f81a679a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:25.140393 env[1211]: 2025-05-08 00:49:25.119 [INFO][4609] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" Namespace="calico-system" Pod="csi-node-driver-k7qpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--k7qpk-eth0" May 8 00:49:25.140393 env[1211]: 2025-05-08 00:49:25.119 [INFO][4609] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia8f81a679a7 ContainerID="04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" Namespace="calico-system" Pod="csi-node-driver-k7qpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--k7qpk-eth0" May 8 00:49:25.140393 env[1211]: 2025-05-08 00:49:25.124 [INFO][4609] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" Namespace="calico-system" Pod="csi-node-driver-k7qpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--k7qpk-eth0" May 8 00:49:25.140393 env[1211]: 2025-05-08 00:49:25.124 [INFO][4609] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" Namespace="calico-system" Pod="csi-node-driver-k7qpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--k7qpk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--k7qpk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"95af3a69-e90f-40a0-a3a8-e84fbf9772e8", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 48, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9", Pod:"csi-node-driver-k7qpk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia8f81a679a7", MAC:"de:fa:ff:3c:02:95", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:49:25.140393 env[1211]: 2025-05-08 00:49:25.136 [INFO][4609] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9" Namespace="calico-system" Pod="csi-node-driver-k7qpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--k7qpk-eth0" May 8 00:49:25.155891 env[1211]: time="2025-05-08T00:49:25.155502718Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:49:25.155891 env[1211]: time="2025-05-08T00:49:25.155551501Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:49:25.155891 env[1211]: time="2025-05-08T00:49:25.155564877Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:49:25.156162 env[1211]: time="2025-05-08T00:49:25.155852794Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9 pid=4653 runtime=io.containerd.runc.v2 May 8 00:49:25.156000 audit[4659]: NETFILTER_CFG table=filter:109 family=2 entries=52 op=nft_register_chain pid=4659 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:49:25.156000 audit[4659]: SYSCALL arch=c000003e syscall=46 success=yes exit=25040 a0=3 a1=7ffcba7c2d60 a2=0 a3=7ffcba7c2d4c items=0 ppid=3616 pid=4659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:25.156000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:49:25.173743 systemd[1]: Started cri-containerd-04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9.scope. May 8 00:49:25.177722 kubelet[2105]: E0508 00:49:25.177685 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:25.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.194000 audit: BPF prog-id=187 op=LOAD May 8 00:49:25.195000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4653 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:25.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034666363346139396366613632346465383732363462366661323662 May 8 00:49:25.195000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4653 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:25.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034666363346139396366613632346465383732363462366661323662 May 8 00:49:25.195000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.195000 audit: BPF prog-id=188 op=LOAD May 8 00:49:25.195000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000090ed0 items=0 ppid=4653 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:25.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034666363346139396366613632346465383732363462366661323662 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit: BPF prog-id=189 op=LOAD May 8 00:49:25.196000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000090f18 items=0 ppid=4653 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:25.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034666363346139396366613632346465383732363462366661323662 May 8 00:49:25.196000 audit: BPF prog-id=189 op=UNLOAD May 8 00:49:25.196000 audit: BPF prog-id=188 op=UNLOAD May 8 00:49:25.196000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { perfmon } for pid=4665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit[4665]: AVC avc: denied { bpf } for pid=4665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:25.196000 audit: BPF prog-id=190 op=LOAD May 8 00:49:25.196000 audit[4665]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000091328 items=0 ppid=4653 pid=4665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:25.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034666363346139396366613632346465383732363462366661323662 May 8 00:49:25.197919 systemd-resolved[1145]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:49:25.214313 env[1211]: time="2025-05-08T00:49:25.214266539Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k7qpk,Uid:95af3a69-e90f-40a0-a3a8-e84fbf9772e8,Namespace:calico-system,Attempt:1,} returns sandbox id \"04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9\"" May 8 00:49:25.256034 kubelet[2105]: I0508 00:49:25.255922 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6bfc598f-lfzp9" podStartSLOduration=42.283884668 podStartE2EDuration="48.255902509s" podCreationTimestamp="2025-05-08 00:48:37 +0000 UTC" firstStartedPulling="2025-05-08 00:49:18.183831639 +0000 UTC m=+63.396589679" lastFinishedPulling="2025-05-08 00:49:24.15584948 +0000 UTC m=+69.368607520" observedRunningTime="2025-05-08 00:49:25.253540652 +0000 UTC m=+70.466298712" watchObservedRunningTime="2025-05-08 00:49:25.255902509 +0000 UTC m=+70.468660549" May 8 00:49:25.267167 kubelet[2105]: I0508 00:49:25.267089 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-bq7kp" podStartSLOduration=57.267069815 podStartE2EDuration="57.267069815s" podCreationTimestamp="2025-05-08 00:48:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:49:25.266626473 +0000 UTC m=+70.479384513" watchObservedRunningTime="2025-05-08 00:49:25.267069815 +0000 UTC m=+70.479827845" May 8 00:49:25.289000 audit[4709]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4709 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:25.289000 audit[4709]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffd2570db0 a2=0 a3=7fffd2570d9c items=0 ppid=2250 pid=4709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:25.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:25.304000 audit[4709]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=4709 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:25.304000 audit[4709]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffd2570db0 a2=0 a3=7fffd2570d9c items=0 ppid=2250 pid=4709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:25.304000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:25.990971 systemd-networkd[1025]: cali4a01b70f18d: Gained IPv6LL May 8 00:49:26.180713 kubelet[2105]: E0508 00:49:26.180627 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:26.183807 systemd-networkd[1025]: cali599509b4e4f: Gained IPv6LL May 8 00:49:26.309000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:26.309000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000375f60 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:49:26.309000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:49:26.310000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:26.310000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cc50c0 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:49:26.310000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:49:26.310000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:26.310000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000375fa0 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:49:26.310000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:49:26.314000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:49:26.314000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000375fe0 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:49:26.314000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:49:26.438861 systemd-networkd[1025]: calia8f81a679a7: Gained IPv6LL May 8 00:49:27.182878 kubelet[2105]: E0508 00:49:27.182827 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:27.363759 env[1211]: time="2025-05-08T00:49:27.363693869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:27.366663 env[1211]: time="2025-05-08T00:49:27.366610647Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:27.369477 env[1211]: time="2025-05-08T00:49:27.369399093Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:27.372991 env[1211]: time="2025-05-08T00:49:27.372940005Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:27.373750 env[1211]: time="2025-05-08T00:49:27.373714105Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 8 00:49:27.375172 env[1211]: time="2025-05-08T00:49:27.375136777Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:49:27.376413 env[1211]: time="2025-05-08T00:49:27.376363225Z" level=info msg="CreateContainer within sandbox \"6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:49:27.399962 env[1211]: time="2025-05-08T00:49:27.399639711Z" level=info msg="CreateContainer within sandbox \"6085849adcd44a65472c1304faf740078625f8a2402b6c40a69c5eabc19b6c1f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"33a28e40a6ac40d638b11934274b3746fe3b4295590ac0802936730ffda148ca\"" May 8 00:49:27.401357 env[1211]: time="2025-05-08T00:49:27.401300485Z" level=info msg="StartContainer for \"33a28e40a6ac40d638b11934274b3746fe3b4295590ac0802936730ffda148ca\"" May 8 00:49:27.423781 systemd[1]: run-containerd-runc-k8s.io-33a28e40a6ac40d638b11934274b3746fe3b4295590ac0802936730ffda148ca-runc.NjBOXi.mount: Deactivated successfully. May 8 00:49:27.425286 systemd[1]: Started cri-containerd-33a28e40a6ac40d638b11934274b3746fe3b4295590ac0802936730ffda148ca.scope. May 8 00:49:27.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.442405 kernel: kauditd_printk_skb: 373 callbacks suppressed May 8 00:49:27.442493 kernel: audit: type=1400 audit(1746665367.440:1381): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.449077 kernel: audit: type=1400 audit(1746665367.440:1382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.449152 kernel: audit: type=1400 audit(1746665367.440:1383): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.456000 kernel: audit: type=1400 audit(1746665367.440:1384): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.459161 kernel: audit: type=1400 audit(1746665367.440:1385): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.459226 kernel: audit: type=1400 audit(1746665367.440:1386): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.465229 kernel: audit: type=1400 audit(1746665367.440:1387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.465315 kernel: audit: type=1400 audit(1746665367.440:1388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.471354 kernel: audit: type=1400 audit(1746665367.440:1389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.474614 kernel: audit: type=1400 audit(1746665367.445:1390): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit: BPF prog-id=191 op=LOAD May 8 00:49:27.445000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[4718]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4273 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:27.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333613238653430613661633430643633386231313933343237346233 May 8 00:49:27.445000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[4718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4273 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:27.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333613238653430613661633430643633386231313933343237346233 May 8 00:49:27.445000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.445000 audit: BPF prog-id=192 op=LOAD May 8 00:49:27.445000 audit[4718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029d2b0 items=0 ppid=4273 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:27.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333613238653430613661633430643633386231313933343237346233 May 8 00:49:27.448000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.448000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.448000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.448000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.448000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.448000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.448000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.448000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.448000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.448000 audit: BPF prog-id=193 op=LOAD May 8 00:49:27.448000 audit[4718]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029d2f8 items=0 ppid=4273 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:27.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333613238653430613661633430643633386231313933343237346233 May 8 00:49:27.452000 audit: BPF prog-id=193 op=UNLOAD May 8 00:49:27.452000 audit: BPF prog-id=192 op=UNLOAD May 8 00:49:27.452000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.452000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.452000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.452000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.452000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.452000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.452000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.452000 audit[4718]: AVC avc: denied { perfmon } for pid=4718 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.452000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.452000 audit[4718]: AVC avc: denied { bpf } for pid=4718 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:27.452000 audit: BPF prog-id=194 op=LOAD May 8 00:49:27.452000 audit[4718]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029d708 items=0 ppid=4273 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:27.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333613238653430613661633430643633386231313933343237346233 May 8 00:49:27.514109 env[1211]: time="2025-05-08T00:49:27.514033555Z" level=info msg="StartContainer for \"33a28e40a6ac40d638b11934274b3746fe3b4295590ac0802936730ffda148ca\" returns successfully" May 8 00:49:27.779824 env[1211]: time="2025-05-08T00:49:27.779745943Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:27.783899 env[1211]: time="2025-05-08T00:49:27.783836229Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:27.785729 env[1211]: time="2025-05-08T00:49:27.785697644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:27.788314 env[1211]: time="2025-05-08T00:49:27.788260600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:27.788867 env[1211]: time="2025-05-08T00:49:27.788813861Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 8 00:49:27.790162 env[1211]: time="2025-05-08T00:49:27.790119560Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 8 00:49:27.791524 env[1211]: time="2025-05-08T00:49:27.791477529Z" level=info msg="CreateContainer within sandbox \"ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:49:27.803556 systemd[1]: Started sshd@19-10.0.0.87:22-10.0.0.1:33570.service. May 8 00:49:27.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.87:22-10.0.0.1:33570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:27.860000 audit[4751]: USER_ACCT pid=4751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:27.861577 sshd[4751]: Accepted publickey for core from 10.0.0.1 port 33570 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:27.861000 audit[4751]: CRED_ACQ pid=4751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:27.861000 audit[4751]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce3240c00 a2=3 a3=0 items=0 ppid=1 pid=4751 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:27.861000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:27.871774 sshd[4751]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:27.876204 systemd-logind[1192]: New session 20 of user core. May 8 00:49:27.877391 systemd[1]: Started session-20.scope. May 8 00:49:27.882000 audit[4751]: USER_START pid=4751 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:27.883000 audit[4753]: CRED_ACQ pid=4753 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:28.117791 sshd[4751]: pam_unix(sshd:session): session closed for user core May 8 00:49:28.118000 audit[4751]: USER_END pid=4751 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:28.118000 audit[4751]: CRED_DISP pid=4751 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:28.120766 systemd[1]: sshd@19-10.0.0.87:22-10.0.0.1:33570.service: Deactivated successfully. May 8 00:49:28.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.87:22-10.0.0.1:33570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:28.121792 systemd[1]: session-20.scope: Deactivated successfully. May 8 00:49:28.122582 systemd-logind[1192]: Session 20 logged out. Waiting for processes to exit. May 8 00:49:28.123314 systemd-logind[1192]: Removed session 20. May 8 00:49:28.252000 audit[4764]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:28.252000 audit[4764]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe112229a0 a2=0 a3=7ffe1122298c items=0 ppid=2250 pid=4764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:28.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:28.256000 audit[4764]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:28.256000 audit[4764]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe112229a0 a2=0 a3=7ffe1122298c items=0 ppid=2250 pid=4764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:28.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:28.259012 env[1211]: time="2025-05-08T00:49:28.258930486Z" level=info msg="CreateContainer within sandbox \"ff0ca264ccfc9ceaec40def99fa5eec932eb75d3b2c1ee0010e4a7632a55075c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d5b4e947306cf48d256f3f50d88f2d29a5e760f33a99b1012209ca63b24b39ac\"" May 8 00:49:28.259772 env[1211]: time="2025-05-08T00:49:28.259736407Z" level=info msg="StartContainer for \"d5b4e947306cf48d256f3f50d88f2d29a5e760f33a99b1012209ca63b24b39ac\"" May 8 00:49:28.278200 systemd[1]: Started cri-containerd-d5b4e947306cf48d256f3f50d88f2d29a5e760f33a99b1012209ca63b24b39ac.scope. May 8 00:49:28.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.293000 audit: BPF prog-id=195 op=LOAD May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4542 pid=4772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:28.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623465393437333036636634386432353666336635306438386632 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4542 pid=4772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:28.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623465393437333036636634386432353666336635306438386632 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit: BPF prog-id=196 op=LOAD May 8 00:49:28.294000 audit[4772]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000280da0 items=0 ppid=4542 pid=4772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:28.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623465393437333036636634386432353666336635306438386632 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit: BPF prog-id=197 op=LOAD May 8 00:49:28.294000 audit[4772]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000280de8 items=0 ppid=4542 pid=4772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:28.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623465393437333036636634386432353666336635306438386632 May 8 00:49:28.294000 audit: BPF prog-id=197 op=UNLOAD May 8 00:49:28.294000 audit: BPF prog-id=196 op=UNLOAD May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { perfmon } for pid=4772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit[4772]: AVC avc: denied { bpf } for pid=4772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:28.294000 audit: BPF prog-id=198 op=LOAD May 8 00:49:28.294000 audit[4772]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002811f8 items=0 ppid=4542 pid=4772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:28.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435623465393437333036636634386432353666336635306438386632 May 8 00:49:28.329091 env[1211]: time="2025-05-08T00:49:28.329020032Z" level=info msg="StartContainer for \"d5b4e947306cf48d256f3f50d88f2d29a5e760f33a99b1012209ca63b24b39ac\" returns successfully" May 8 00:49:28.656000 audit[4729]: AVC avc: denied { watch } for pid=4729 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_48_54.4138615825/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c933 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c158,c933 tclass=file permissive=0 May 8 00:49:28.656000 audit[4729]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0016afb80 a2=fc6 a3=0 items=0 ppid=4273 pid=4729 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c933 key=(null) May 8 00:49:28.656000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:49:28.678322 kubelet[2105]: I0508 00:49:28.678098 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-59c4d76dbf-sk59c" podStartSLOduration=47.891205561 podStartE2EDuration="51.678074255s" podCreationTimestamp="2025-05-08 00:48:37 +0000 UTC" firstStartedPulling="2025-05-08 00:49:23.587971569 +0000 UTC m=+68.800729609" lastFinishedPulling="2025-05-08 00:49:27.374840263 +0000 UTC m=+72.587598303" observedRunningTime="2025-05-08 00:49:28.226379958 +0000 UTC m=+73.439138008" watchObservedRunningTime="2025-05-08 00:49:28.678074255 +0000 UTC m=+73.890832295" May 8 00:49:28.698000 audit[4806]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:28.698000 audit[4806]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd72b03170 a2=0 a3=7ffd72b0315c items=0 ppid=2250 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:28.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:28.703000 audit[4806]: NETFILTER_CFG table=nat:115 family=2 entries=27 op=nft_register_chain pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:28.703000 audit[4806]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd72b03170 a2=0 a3=7ffd72b0315c items=0 ppid=2250 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:28.703000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:28.893586 kubelet[2105]: E0508 00:49:28.893525 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:29.317036 kubelet[2105]: I0508 00:49:29.316955 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-59c4d76dbf-zzmgd" podStartSLOduration=49.131444748 podStartE2EDuration="52.316938196s" podCreationTimestamp="2025-05-08 00:48:37 +0000 UTC" firstStartedPulling="2025-05-08 00:49:24.604418649 +0000 UTC m=+69.817176689" lastFinishedPulling="2025-05-08 00:49:27.789912077 +0000 UTC m=+73.002670137" observedRunningTime="2025-05-08 00:49:29.31682428 +0000 UTC m=+74.529582320" watchObservedRunningTime="2025-05-08 00:49:29.316938196 +0000 UTC m=+74.529696236" May 8 00:49:29.389000 audit[4808]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:29.389000 audit[4808]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe3aa25c20 a2=0 a3=7ffe3aa25c0c items=0 ppid=2250 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:29.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:29.394000 audit[4808]: NETFILTER_CFG table=nat:117 family=2 entries=30 op=nft_register_rule pid=4808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:29.394000 audit[4808]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe3aa25c20 a2=0 a3=7ffe3aa25c0c items=0 ppid=2250 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:29.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:29.770000 audit[4783]: AVC avc: denied { watch } for pid=4783 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_48_54.3951506308/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c28,c221 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c28,c221 tclass=file permissive=0 May 8 00:49:29.770000 audit[4783]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001466ea0 a2=fc6 a3=0 items=0 ppid=4542 pid=4783 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c28,c221 key=(null) May 8 00:49:29.770000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:49:29.896670 env[1211]: time="2025-05-08T00:49:29.896570711Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:29.899678 env[1211]: time="2025-05-08T00:49:29.899615119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:29.902595 env[1211]: time="2025-05-08T00:49:29.902487700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:29.905073 env[1211]: time="2025-05-08T00:49:29.905012311Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:29.905885 env[1211]: time="2025-05-08T00:49:29.905725405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 8 00:49:29.909189 env[1211]: time="2025-05-08T00:49:29.909134214Z" level=info msg="CreateContainer within sandbox \"04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 8 00:49:29.930721 env[1211]: time="2025-05-08T00:49:29.930616772Z" level=info msg="CreateContainer within sandbox \"04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f306ffa6ee75a868895b81a01be5fe39d597817fea4245d1a376de6a1b5f14a2\"" May 8 00:49:29.931426 env[1211]: time="2025-05-08T00:49:29.931396451Z" level=info msg="StartContainer for \"f306ffa6ee75a868895b81a01be5fe39d597817fea4245d1a376de6a1b5f14a2\"" May 8 00:49:29.956997 systemd[1]: run-containerd-runc-k8s.io-f306ffa6ee75a868895b81a01be5fe39d597817fea4245d1a376de6a1b5f14a2-runc.T9LU0r.mount: Deactivated successfully. May 8 00:49:29.958849 systemd[1]: Started cri-containerd-f306ffa6ee75a868895b81a01be5fe39d597817fea4245d1a376de6a1b5f14a2.scope. May 8 00:49:29.980000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fcb4f86cb38 items=0 ppid=4653 pid=4819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:29.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303666666136656537356138363838393562383161303162653566 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit: BPF prog-id=199 op=LOAD May 8 00:49:29.980000 audit[4819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d5ba8 items=0 ppid=4653 pid=4819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:29.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303666666136656537356138363838393562383161303162653566 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.980000 audit: BPF prog-id=200 op=LOAD May 8 00:49:29.980000 audit[4819]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d5bf8 items=0 ppid=4653 pid=4819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:29.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303666666136656537356138363838393562383161303162653566 May 8 00:49:29.981000 audit: BPF prog-id=200 op=UNLOAD May 8 00:49:29.981000 audit: BPF prog-id=199 op=UNLOAD May 8 00:49:29.981000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.981000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.981000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.981000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.981000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.981000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.981000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.981000 audit[4819]: AVC avc: denied { perfmon } for pid=4819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.981000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.981000 audit[4819]: AVC avc: denied { bpf } for pid=4819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:29.981000 audit: BPF prog-id=201 op=LOAD May 8 00:49:29.981000 audit[4819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d5c88 items=0 ppid=4653 pid=4819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:29.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303666666136656537356138363838393562383161303162653566 May 8 00:49:30.000794 env[1211]: time="2025-05-08T00:49:30.000708367Z" level=info msg="StartContainer for \"f306ffa6ee75a868895b81a01be5fe39d597817fea4245d1a376de6a1b5f14a2\" returns successfully" May 8 00:49:30.002686 env[1211]: time="2025-05-08T00:49:30.002309133Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 8 00:49:30.199293 kubelet[2105]: I0508 00:49:30.199141 2105 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:49:32.900734 kubelet[2105]: E0508 00:49:32.900677 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:33.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.87:22-10.0.0.1:33584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:33.123797 systemd[1]: Started sshd@20-10.0.0.87:22-10.0.0.1:33584.service. May 8 00:49:33.125146 kernel: kauditd_printk_skb: 182 callbacks suppressed May 8 00:49:33.125203 kernel: audit: type=1130 audit(1746665373.122:1440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.87:22-10.0.0.1:33584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:33.167000 audit[4855]: USER_ACCT pid=4855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.169320 sshd[4855]: Accepted publickey for core from 10.0.0.1 port 33584 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:33.172297 sshd[4855]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:33.170000 audit[4855]: CRED_ACQ pid=4855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.177973 systemd-logind[1192]: New session 21 of user core. May 8 00:49:33.180807 systemd[1]: Started session-21.scope. May 8 00:49:33.181771 kernel: audit: type=1101 audit(1746665373.167:1441): pid=4855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.181835 kernel: audit: type=1103 audit(1746665373.170:1442): pid=4855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.181874 kernel: audit: type=1006 audit(1746665373.170:1443): pid=4855 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 8 00:49:33.170000 audit[4855]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd687d5d20 a2=3 a3=0 items=0 ppid=1 pid=4855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:33.218165 kernel: audit: type=1300 audit(1746665373.170:1443): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd687d5d20 a2=3 a3=0 items=0 ppid=1 pid=4855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:33.218336 kernel: audit: type=1327 audit(1746665373.170:1443): proctitle=737368643A20636F7265205B707269765D May 8 00:49:33.170000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:33.194000 audit[4855]: USER_START pid=4855 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.196000 audit[4857]: CRED_ACQ pid=4857 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.241054 kernel: audit: type=1105 audit(1746665373.194:1444): pid=4855 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.241378 kernel: audit: type=1103 audit(1746665373.196:1445): pid=4857 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.321220 sshd[4855]: pam_unix(sshd:session): session closed for user core May 8 00:49:33.321000 audit[4855]: USER_END pid=4855 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.325382 systemd[1]: Started sshd@21-10.0.0.87:22-10.0.0.1:33600.service. May 8 00:49:33.325894 systemd[1]: sshd@20-10.0.0.87:22-10.0.0.1:33584.service: Deactivated successfully. May 8 00:49:33.327122 systemd[1]: session-21.scope: Deactivated successfully. May 8 00:49:33.321000 audit[4855]: CRED_DISP pid=4855 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.328128 systemd-logind[1192]: Session 21 logged out. Waiting for processes to exit. May 8 00:49:33.329278 systemd-logind[1192]: Removed session 21. May 8 00:49:33.331128 kernel: audit: type=1106 audit(1746665373.321:1446): pid=4855 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.331186 kernel: audit: type=1104 audit(1746665373.321:1447): pid=4855 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.87:22-10.0.0.1:33600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:33.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.87:22-10.0.0.1:33584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:33.360000 audit[4868]: USER_ACCT pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.362487 sshd[4868]: Accepted publickey for core from 10.0.0.1 port 33600 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:33.361000 audit[4868]: CRED_ACQ pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.361000 audit[4868]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc1fcb570 a2=3 a3=0 items=0 ppid=1 pid=4868 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:33.361000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:33.363571 sshd[4868]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:33.368199 systemd-logind[1192]: New session 22 of user core. May 8 00:49:33.369361 systemd[1]: Started session-22.scope. May 8 00:49:33.373000 audit[4868]: USER_START pid=4868 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:33.375000 audit[4871]: CRED_ACQ pid=4871 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:34.504387 env[1211]: time="2025-05-08T00:49:34.504310747Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:34.980621 env[1211]: time="2025-05-08T00:49:34.980541548Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:35.427458 env[1211]: time="2025-05-08T00:49:35.427364944Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:35.488618 env[1211]: time="2025-05-08T00:49:35.488546988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:49:35.489215 env[1211]: time="2025-05-08T00:49:35.489171441Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 8 00:49:35.491439 env[1211]: time="2025-05-08T00:49:35.491407288Z" level=info msg="CreateContainer within sandbox \"04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 8 00:49:35.868457 sshd[4868]: pam_unix(sshd:session): session closed for user core May 8 00:49:35.867000 audit[4868]: USER_END pid=4868 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:35.868000 audit[4868]: CRED_DISP pid=4868 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:35.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.87:22-10.0.0.1:33600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:35.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.87:22-10.0.0.1:44188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:35.871663 systemd[1]: sshd@21-10.0.0.87:22-10.0.0.1:33600.service: Deactivated successfully. May 8 00:49:35.872331 systemd[1]: session-22.scope: Deactivated successfully. May 8 00:49:35.872970 systemd-logind[1192]: Session 22 logged out. Waiting for processes to exit. May 8 00:49:35.874105 systemd[1]: Started sshd@22-10.0.0.87:22-10.0.0.1:44188.service. May 8 00:49:35.874916 systemd-logind[1192]: Removed session 22. May 8 00:49:36.045000 audit[4883]: USER_ACCT pid=4883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:36.047241 sshd[4883]: Accepted publickey for core from 10.0.0.1 port 44188 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:36.046000 audit[4883]: CRED_ACQ pid=4883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:36.046000 audit[4883]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaeb3f0b0 a2=3 a3=0 items=0 ppid=1 pid=4883 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:36.046000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:36.048628 sshd[4883]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:36.053269 systemd-logind[1192]: New session 23 of user core. May 8 00:49:36.054422 systemd[1]: Started session-23.scope. May 8 00:49:36.059000 audit[4883]: USER_START pid=4883 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:36.060000 audit[4885]: CRED_ACQ pid=4885 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:37.011825 env[1211]: time="2025-05-08T00:49:37.011732963Z" level=info msg="CreateContainer within sandbox \"04fcc4a99cfa624de87264b6fa26bc61cc1ad766c1407299c934f81dcac4ade9\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2991db266fa8c327d558399b852c2d80444b478771224da30d84dd7d48208c4a\"" May 8 00:49:37.012524 env[1211]: time="2025-05-08T00:49:37.012476121Z" level=info msg="StartContainer for \"2991db266fa8c327d558399b852c2d80444b478771224da30d84dd7d48208c4a\"" May 8 00:49:37.045325 systemd[1]: Started cri-containerd-2991db266fa8c327d558399b852c2d80444b478771224da30d84dd7d48208c4a.scope. May 8 00:49:37.048455 systemd[1]: run-containerd-runc-k8s.io-2991db266fa8c327d558399b852c2d80444b478771224da30d84dd7d48208c4a-runc.pSuxU7.mount: Deactivated successfully. May 8 00:49:37.062000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.062000 audit[4900]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe71d220d38 items=0 ppid=4653 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:37.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393164623236366661386333323764353538333939623835326332 May 8 00:49:37.062000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.062000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.062000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.062000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.062000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.062000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.062000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.062000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.062000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.062000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.062000 audit: BPF prog-id=202 op=LOAD May 8 00:49:37.062000 audit[4900]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003fc288 items=0 ppid=4653 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:37.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393164623236366661386333323764353538333939623835326332 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit: BPF prog-id=203 op=LOAD May 8 00:49:37.063000 audit[4900]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003fc2d8 items=0 ppid=4653 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:37.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393164623236366661386333323764353538333939623835326332 May 8 00:49:37.063000 audit: BPF prog-id=203 op=UNLOAD May 8 00:49:37.063000 audit: BPF prog-id=202 op=UNLOAD May 8 00:49:37.063000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:49:37.063000 audit: BPF prog-id=204 op=LOAD May 8 00:49:37.063000 audit[4900]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003fc368 items=0 ppid=4653 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:37.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393164623236366661386333323764353538333939623835326332 May 8 00:49:37.340226 env[1211]: time="2025-05-08T00:49:37.340090213Z" level=info msg="StartContainer for \"2991db266fa8c327d558399b852c2d80444b478771224da30d84dd7d48208c4a\" returns successfully" May 8 00:49:38.044680 kubelet[2105]: I0508 00:49:38.044553 2105 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-k7qpk" podStartSLOduration=50.770160551000004 podStartE2EDuration="1m1.044513701s" podCreationTimestamp="2025-05-08 00:48:37 +0000 UTC" firstStartedPulling="2025-05-08 00:49:25.215757441 +0000 UTC m=+70.428515481" lastFinishedPulling="2025-05-08 00:49:35.490110591 +0000 UTC m=+80.702868631" observedRunningTime="2025-05-08 00:49:38.04418054 +0000 UTC m=+83.256938630" watchObservedRunningTime="2025-05-08 00:49:38.044513701 +0000 UTC m=+83.257271761" May 8 00:49:38.145126 kubelet[2105]: I0508 00:49:38.145074 2105 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 8 00:49:38.145126 kubelet[2105]: I0508 00:49:38.145118 2105 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 8 00:49:39.508188 kernel: kauditd_printk_skb: 63 callbacks suppressed May 8 00:49:39.508545 kernel: audit: type=1325 audit(1746665379.501:1470): table=filter:118 family=2 entries=20 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:39.501000 audit[4942]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:39.501000 audit[4942]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffed95fb250 a2=0 a3=7ffed95fb23c items=0 ppid=2250 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:39.517713 kernel: audit: type=1300 audit(1746665379.501:1470): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffed95fb250 a2=0 a3=7ffed95fb23c items=0 ppid=2250 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:39.521552 kernel: audit: type=1327 audit(1746665379.501:1470): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:39.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:39.518000 audit[4942]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:39.518000 audit[4942]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed95fb250 a2=0 a3=0 items=0 ppid=2250 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:39.532289 kernel: audit: type=1325 audit(1746665379.518:1471): table=nat:119 family=2 entries=22 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:39.532433 kernel: audit: type=1300 audit(1746665379.518:1471): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed95fb250 a2=0 a3=0 items=0 ppid=2250 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:39.533562 systemd[1]: Started sshd@23-10.0.0.87:22-10.0.0.1:44194.service. May 8 00:49:39.535184 sshd[4883]: pam_unix(sshd:session): session closed for user core May 8 00:49:39.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:39.542724 kernel: audit: type=1327 audit(1746665379.518:1471): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:39.538584 systemd[1]: sshd@22-10.0.0.87:22-10.0.0.1:44188.service: Deactivated successfully. May 8 00:49:39.539754 systemd[1]: session-23.scope: Deactivated successfully. May 8 00:49:39.542127 systemd-logind[1192]: Session 23 logged out. Waiting for processes to exit. May 8 00:49:39.543216 systemd-logind[1192]: Removed session 23. May 8 00:49:39.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.87:22-10.0.0.1:44194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:39.555403 kernel: audit: type=1130 audit(1746665379.532:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.87:22-10.0.0.1:44194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:39.555527 kernel: audit: type=1106 audit(1746665379.534:1473): pid=4883 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.534000 audit[4883]: USER_END pid=4883 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.534000 audit[4883]: CRED_DISP pid=4883 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.87:22-10.0.0.1:44188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:39.566106 kernel: audit: type=1104 audit(1746665379.534:1474): pid=4883 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.566278 kernel: audit: type=1131 audit(1746665379.537:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.87:22-10.0.0.1:44188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:39.548000 audit[4947]: NETFILTER_CFG table=filter:120 family=2 entries=32 op=nft_register_rule pid=4947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:39.548000 audit[4947]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffe76ea540 a2=0 a3=7fffe76ea52c items=0 ppid=2250 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:39.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:39.561000 audit[4947]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=4947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:39.561000 audit[4947]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffe76ea540 a2=0 a3=0 items=0 ppid=2250 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:39.561000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:39.585000 audit[4944]: USER_ACCT pid=4944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.587674 sshd[4944]: Accepted publickey for core from 10.0.0.1 port 44194 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:39.586000 audit[4944]: CRED_ACQ pid=4944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.586000 audit[4944]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5527f760 a2=3 a3=0 items=0 ppid=1 pid=4944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:39.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:39.589046 sshd[4944]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:39.593568 systemd-logind[1192]: New session 24 of user core. May 8 00:49:39.594523 systemd[1]: Started session-24.scope. May 8 00:49:39.600000 audit[4944]: USER_START pid=4944 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.601000 audit[4949]: CRED_ACQ pid=4949 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.871030 sshd[4944]: pam_unix(sshd:session): session closed for user core May 8 00:49:39.870000 audit[4944]: USER_END pid=4944 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.870000 audit[4944]: CRED_DISP pid=4944 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.874823 systemd[1]: sshd@23-10.0.0.87:22-10.0.0.1:44194.service: Deactivated successfully. May 8 00:49:39.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.87:22-10.0.0.1:44194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:39.875892 systemd[1]: session-24.scope: Deactivated successfully. May 8 00:49:39.876480 systemd-logind[1192]: Session 24 logged out. Waiting for processes to exit. May 8 00:49:39.878095 systemd[1]: Started sshd@24-10.0.0.87:22-10.0.0.1:44206.service. May 8 00:49:39.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.87:22-10.0.0.1:44206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:39.880100 systemd-logind[1192]: Removed session 24. May 8 00:49:39.913000 audit[4959]: USER_ACCT pid=4959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.916528 sshd[4959]: Accepted publickey for core from 10.0.0.1 port 44206 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:39.915000 audit[4959]: CRED_ACQ pid=4959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.915000 audit[4959]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3759dd20 a2=3 a3=0 items=0 ppid=1 pid=4959 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:39.915000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:39.917244 sshd[4959]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:39.923210 systemd-logind[1192]: New session 25 of user core. May 8 00:49:39.924280 systemd[1]: Started session-25.scope. May 8 00:49:39.928000 audit[4959]: USER_START pid=4959 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:39.930000 audit[4961]: CRED_ACQ pid=4961 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:40.061505 sshd[4959]: pam_unix(sshd:session): session closed for user core May 8 00:49:40.061000 audit[4959]: USER_END pid=4959 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:40.061000 audit[4959]: CRED_DISP pid=4959 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:40.065115 systemd[1]: sshd@24-10.0.0.87:22-10.0.0.1:44206.service: Deactivated successfully. May 8 00:49:40.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.87:22-10.0.0.1:44206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:40.066065 systemd[1]: session-25.scope: Deactivated successfully. May 8 00:49:40.067127 systemd-logind[1192]: Session 25 logged out. Waiting for processes to exit. May 8 00:49:40.068564 systemd-logind[1192]: Removed session 25. May 8 00:49:40.189640 kubelet[2105]: I0508 00:49:40.189455 2105 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:49:40.566714 systemd[1]: run-containerd-runc-k8s.io-456244fa3beda936874c6663c195b97827c94a74d6be3ab5149af47107d039f2-runc.7ADLk1.mount: Deactivated successfully. May 8 00:49:40.582000 audit[4988]: NETFILTER_CFG table=filter:122 family=2 entries=32 op=nft_register_rule pid=4988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:40.582000 audit[4988]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdc54e2c00 a2=0 a3=7ffdc54e2bec items=0 ppid=2250 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:40.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:40.588000 audit[4988]: NETFILTER_CFG table=nat:123 family=2 entries=34 op=nft_register_chain pid=4988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:40.588000 audit[4988]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdc54e2c00 a2=0 a3=7ffdc54e2bec items=0 ppid=2250 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:40.588000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:40.629565 kubelet[2105]: E0508 00:49:40.629523 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:42.893466 kubelet[2105]: E0508 00:49:42.893396 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:45.065255 systemd[1]: Started sshd@25-10.0.0.87:22-10.0.0.1:34360.service. May 8 00:49:45.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.87:22-10.0.0.1:34360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:45.066762 kernel: kauditd_printk_skb: 33 callbacks suppressed May 8 00:49:45.066836 kernel: audit: type=1130 audit(1746665385.063:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.87:22-10.0.0.1:34360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:45.103000 audit[4997]: USER_ACCT pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.112245 kernel: audit: type=1101 audit(1746665385.103:1498): pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.112353 kernel: audit: type=1103 audit(1746665385.109:1499): pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.109000 audit[4997]: CRED_ACQ pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.112476 sshd[4997]: Accepted publickey for core from 10.0.0.1 port 34360 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:45.111801 sshd[4997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:45.118613 kernel: audit: type=1006 audit(1746665385.109:1500): pid=4997 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 8 00:49:45.109000 audit[4997]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbe3ba020 a2=3 a3=0 items=0 ppid=1 pid=4997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:45.120202 systemd-logind[1192]: New session 26 of user core. May 8 00:49:45.120512 systemd[1]: Started session-26.scope. May 8 00:49:45.126141 kernel: audit: type=1300 audit(1746665385.109:1500): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbe3ba020 a2=3 a3=0 items=0 ppid=1 pid=4997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:45.126213 kernel: audit: type=1327 audit(1746665385.109:1500): proctitle=737368643A20636F7265205B707269765D May 8 00:49:45.109000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:45.125000 audit[4997]: USER_START pid=4997 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.136889 kernel: audit: type=1105 audit(1746665385.125:1501): pid=4997 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.137059 kernel: audit: type=1103 audit(1746665385.127:1502): pid=4999 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.127000 audit[4999]: CRED_ACQ pid=4999 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.320137 sshd[4997]: pam_unix(sshd:session): session closed for user core May 8 00:49:45.319000 audit[4997]: USER_END pid=4997 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.323345 systemd[1]: sshd@25-10.0.0.87:22-10.0.0.1:34360.service: Deactivated successfully. May 8 00:49:45.324662 systemd[1]: session-26.scope: Deactivated successfully. May 8 00:49:45.325759 systemd-logind[1192]: Session 26 logged out. Waiting for processes to exit. May 8 00:49:45.319000 audit[4997]: CRED_DISP pid=4997 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.326799 systemd-logind[1192]: Removed session 26. May 8 00:49:45.329828 kernel: audit: type=1106 audit(1746665385.319:1503): pid=4997 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.329928 kernel: audit: type=1104 audit(1746665385.319:1504): pid=4997 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:45.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.87:22-10.0.0.1:34360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:49.493000 audit[5012]: NETFILTER_CFG table=filter:124 family=2 entries=20 op=nft_register_rule pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:49.493000 audit[5012]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffef0053390 a2=0 a3=7ffef005337c items=0 ppid=2250 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:49.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:49.499000 audit[5012]: NETFILTER_CFG table=nat:125 family=2 entries=106 op=nft_register_chain pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:49:49.499000 audit[5012]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffef0053390 a2=0 a3=7ffef005337c items=0 ppid=2250 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:49.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:49:50.325136 systemd[1]: Started sshd@26-10.0.0.87:22-10.0.0.1:34362.service. May 8 00:49:50.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.87:22-10.0.0.1:34362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:50.326371 kernel: kauditd_printk_skb: 7 callbacks suppressed May 8 00:49:50.326456 kernel: audit: type=1130 audit(1746665390.323:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.87:22-10.0.0.1:34362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:50.361000 audit[5015]: USER_ACCT pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.361000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.365760 sshd[5015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:50.370181 sshd[5015]: Accepted publickey for core from 10.0.0.1 port 34362 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:50.372195 systemd[1]: Started session-27.scope. May 8 00:49:50.372980 systemd-logind[1192]: New session 27 of user core. May 8 00:49:50.374407 kernel: audit: type=1101 audit(1746665390.361:1509): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.374476 kernel: audit: type=1103 audit(1746665390.361:1510): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.374512 kernel: audit: type=1006 audit(1746665390.361:1511): pid=5015 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 8 00:49:50.361000 audit[5015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd791d34f0 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:50.383094 kernel: audit: type=1300 audit(1746665390.361:1511): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd791d34f0 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:50.383171 kernel: audit: type=1327 audit(1746665390.361:1511): proctitle=737368643A20636F7265205B707269765D May 8 00:49:50.361000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:50.376000 audit[5015]: USER_START pid=5015 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.390431 kernel: audit: type=1105 audit(1746665390.376:1512): pid=5015 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.390489 kernel: audit: type=1103 audit(1746665390.376:1513): pid=5017 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.376000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.502481 sshd[5015]: pam_unix(sshd:session): session closed for user core May 8 00:49:50.502000 audit[5015]: USER_END pid=5015 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.505791 systemd[1]: sshd@26-10.0.0.87:22-10.0.0.1:34362.service: Deactivated successfully. May 8 00:49:50.506791 systemd[1]: session-27.scope: Deactivated successfully. May 8 00:49:50.507410 systemd-logind[1192]: Session 27 logged out. Waiting for processes to exit. May 8 00:49:50.508394 systemd-logind[1192]: Removed session 27. May 8 00:49:50.502000 audit[5015]: CRED_DISP pid=5015 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.513399 kernel: audit: type=1106 audit(1746665390.502:1514): pid=5015 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.513463 kernel: audit: type=1104 audit(1746665390.502:1515): pid=5015 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:50.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.87:22-10.0.0.1:34362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:50.894026 kubelet[2105]: E0508 00:49:50.893975 2105 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:49:55.507478 systemd[1]: Started sshd@27-10.0.0.87:22-10.0.0.1:55912.service. May 8 00:49:55.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.87:22-10.0.0.1:55912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:55.508865 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:49:55.508929 kernel: audit: type=1130 audit(1746665395.507:1517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.87:22-10.0.0.1:55912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:49:55.543000 audit[5055]: USER_ACCT pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.544121 sshd[5055]: Accepted publickey for core from 10.0.0.1 port 55912 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:49:55.545339 sshd[5055]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:49:55.556230 systemd-logind[1192]: New session 28 of user core. May 8 00:49:55.630639 kernel: audit: type=1101 audit(1746665395.543:1518): pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.630760 kernel: audit: type=1103 audit(1746665395.544:1519): pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.630777 kernel: audit: type=1006 audit(1746665395.544:1520): pid=5055 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 8 00:49:55.630795 kernel: audit: type=1300 audit(1746665395.544:1520): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb584c770 a2=3 a3=0 items=0 ppid=1 pid=5055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:55.544000 audit[5055]: CRED_ACQ pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.544000 audit[5055]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb584c770 a2=3 a3=0 items=0 ppid=1 pid=5055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:49:55.556704 systemd[1]: Started session-28.scope. May 8 00:49:55.544000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:49:55.811833 kernel: audit: type=1327 audit(1746665395.544:1520): proctitle=737368643A20636F7265205B707269765D May 8 00:49:55.811889 kernel: audit: type=1105 audit(1746665395.568:1521): pid=5055 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.568000 audit[5055]: USER_START pid=5055 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.569000 audit[5058]: CRED_ACQ pid=5058 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.819492 kernel: audit: type=1103 audit(1746665395.569:1522): pid=5058 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.894350 sshd[5055]: pam_unix(sshd:session): session closed for user core May 8 00:49:55.894000 audit[5055]: USER_END pid=5055 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.896669 systemd[1]: sshd@27-10.0.0.87:22-10.0.0.1:55912.service: Deactivated successfully. May 8 00:49:55.897572 systemd[1]: session-28.scope: Deactivated successfully. May 8 00:49:55.898663 systemd-logind[1192]: Session 28 logged out. Waiting for processes to exit. May 8 00:49:55.899584 systemd-logind[1192]: Removed session 28. May 8 00:49:55.894000 audit[5055]: CRED_DISP pid=5055 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.920469 kernel: audit: type=1106 audit(1746665395.894:1523): pid=5055 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.920534 kernel: audit: type=1104 audit(1746665395.894:1524): pid=5055 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:49:55.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.87:22-10.0.0.1:55912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:50:00.899984 systemd[1]: Started sshd@28-10.0.0.87:22-10.0.0.1:55928.service. May 8 00:50:00.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.87:22-10.0.0.1:55928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:50:00.901491 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:50:00.901534 kernel: audit: type=1130 audit(1746665400.899:1526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.87:22-10.0.0.1:55928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:50:00.934913 sshd[5071]: Accepted publickey for core from 10.0.0.1 port 55928 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:50:00.934000 audit[5071]: USER_ACCT pid=5071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:00.937150 sshd[5071]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:50:00.936000 audit[5071]: CRED_ACQ pid=5071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:00.943072 systemd[1]: Started session-29.scope. May 8 00:50:00.944311 systemd-logind[1192]: New session 29 of user core. May 8 00:50:00.945574 kernel: audit: type=1101 audit(1746665400.934:1527): pid=5071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:00.945619 kernel: audit: type=1103 audit(1746665400.936:1528): pid=5071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:00.936000 audit[5071]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe639e1cd0 a2=3 a3=0 items=0 ppid=1 pid=5071 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:50:00.958915 kernel: audit: type=1006 audit(1746665400.936:1529): pid=5071 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 8 00:50:00.958975 kernel: audit: type=1300 audit(1746665400.936:1529): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe639e1cd0 a2=3 a3=0 items=0 ppid=1 pid=5071 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:50:00.959004 kernel: audit: type=1327 audit(1746665400.936:1529): proctitle=737368643A20636F7265205B707269765D May 8 00:50:00.936000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:50:00.960482 kernel: audit: type=1105 audit(1746665400.948:1530): pid=5071 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:00.948000 audit[5071]: USER_START pid=5071 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:00.950000 audit[5075]: CRED_ACQ pid=5075 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:00.968767 kernel: audit: type=1103 audit(1746665400.950:1531): pid=5075 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:01.061340 sshd[5071]: pam_unix(sshd:session): session closed for user core May 8 00:50:01.061000 audit[5071]: USER_END pid=5071 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:01.064006 systemd[1]: sshd@28-10.0.0.87:22-10.0.0.1:55928.service: Deactivated successfully. May 8 00:50:01.064883 systemd[1]: session-29.scope: Deactivated successfully. May 8 00:50:01.065930 systemd-logind[1192]: Session 29 logged out. Waiting for processes to exit. May 8 00:50:01.066843 systemd-logind[1192]: Removed session 29. May 8 00:50:01.061000 audit[5071]: CRED_DISP pid=5071 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:01.085010 kernel: audit: type=1106 audit(1746665401.061:1532): pid=5071 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:01.098114 kernel: audit: type=1104 audit(1746665401.061:1533): pid=5071 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:01.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.87:22-10.0.0.1:55928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:50:06.067219 systemd[1]: Started sshd@29-10.0.0.87:22-10.0.0.1:46224.service. May 8 00:50:06.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.87:22-10.0.0.1:46224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:50:06.128159 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:50:06.128346 kernel: audit: type=1130 audit(1746665406.066:1535): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.87:22-10.0.0.1:46224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:50:06.154000 audit[5088]: USER_ACCT pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.155219 sshd[5088]: Accepted publickey for core from 10.0.0.1 port 46224 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:50:06.177673 kernel: audit: type=1101 audit(1746665406.154:1536): pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.177745 kernel: audit: type=1103 audit(1746665406.177:1537): pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.177000 audit[5088]: CRED_ACQ pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.178075 sshd[5088]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:50:06.182411 systemd-logind[1192]: New session 30 of user core. May 8 00:50:06.183403 systemd[1]: Started session-30.scope. May 8 00:50:06.235591 kernel: audit: type=1006 audit(1746665406.177:1538): pid=5088 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 May 8 00:50:06.235688 kernel: audit: type=1300 audit(1746665406.177:1538): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa8f49bd0 a2=3 a3=0 items=0 ppid=1 pid=5088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:50:06.177000 audit[5088]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa8f49bd0 a2=3 a3=0 items=0 ppid=1 pid=5088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:50:06.239989 kernel: audit: type=1327 audit(1746665406.177:1538): proctitle=737368643A20636F7265205B707269765D May 8 00:50:06.177000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:50:06.187000 audit[5088]: USER_START pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.246280 kernel: audit: type=1105 audit(1746665406.187:1539): pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.246461 kernel: audit: type=1103 audit(1746665406.188:1540): pid=5090 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.188000 audit[5090]: CRED_ACQ pid=5090 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.352005 sshd[5088]: pam_unix(sshd:session): session closed for user core May 8 00:50:06.352000 audit[5088]: USER_END pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.354967 systemd[1]: sshd@29-10.0.0.87:22-10.0.0.1:46224.service: Deactivated successfully. May 8 00:50:06.355902 systemd[1]: session-30.scope: Deactivated successfully. May 8 00:50:06.356582 systemd-logind[1192]: Session 30 logged out. Waiting for processes to exit. May 8 00:50:06.357339 systemd-logind[1192]: Removed session 30. May 8 00:50:06.352000 audit[5088]: CRED_DISP pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.401417 kernel: audit: type=1106 audit(1746665406.352:1541): pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.401497 kernel: audit: type=1104 audit(1746665406.352:1542): pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:06.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.87:22-10.0.0.1:46224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:50:10.695000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:50:10.695000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c72640 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:50:10.695000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:50:10.695000 audit[1983]: AVC avc: denied { watch } for pid=1983 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:50:10.695000 audit[1983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00211e060 a2=fc6 a3=0 items=0 ppid=1831 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c535,c729 key=(null) May 8 00:50:10.695000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:50:11.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.87:22-10.0.0.1:46238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:50:11.356994 systemd[1]: Started sshd@30-10.0.0.87:22-10.0.0.1:46238.service. May 8 00:50:11.358389 kernel: kauditd_printk_skb: 7 callbacks suppressed May 8 00:50:11.358430 kernel: audit: type=1130 audit(1746665411.356:1546): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.87:22-10.0.0.1:46238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:50:11.392000 audit[5144]: USER_ACCT pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:11.393497 sshd[5144]: Accepted publickey for core from 10.0.0.1 port 46238 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:50:11.395249 sshd[5144]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:50:11.394000 audit[5144]: CRED_ACQ pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:11.399277 systemd-logind[1192]: New session 31 of user core. May 8 00:50:11.400319 systemd[1]: Started session-31.scope. May 8 00:50:11.402250 kernel: audit: type=1101 audit(1746665411.392:1547): pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:11.402331 kernel: audit: type=1103 audit(1746665411.394:1548): pid=5144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:11.402363 kernel: audit: type=1006 audit(1746665411.394:1549): pid=5144 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 May 8 00:50:11.404754 kernel: audit: type=1300 audit(1746665411.394:1549): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde5ee9c90 a2=3 a3=0 items=0 ppid=1 pid=5144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:50:11.394000 audit[5144]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde5ee9c90 a2=3 a3=0 items=0 ppid=1 pid=5144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:50:11.394000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:50:11.410473 kernel: audit: type=1327 audit(1746665411.394:1549): proctitle=737368643A20636F7265205B707269765D May 8 00:50:11.410546 kernel: audit: type=1105 audit(1746665411.404:1550): pid=5144 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:11.404000 audit[5144]: USER_START pid=5144 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:11.406000 audit[5146]: CRED_ACQ pid=5146 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:11.418451 kernel: audit: type=1103 audit(1746665411.406:1551): pid=5146 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:11.502000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:50:11.502000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c01180fad0 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:50:11.511401 kernel: audit: type=1400 audit(1746665411.502:1552): avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:50:11.511460 kernel: audit: type=1300 audit(1746665411.502:1552): arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c01180fad0 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:50:11.502000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:50:11.502000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:50:11.502000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00fe6e2e0 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:50:11.502000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:50:11.502000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8231 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:50:11.502000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00531c160 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:50:11.502000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:50:11.503000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:50:11.503000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c010f63f50 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:50:11.503000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:50:11.505000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8237 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:50:11.505000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c010f63f80 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:50:11.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:50:11.505000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:50:11.505000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c004da71a0 a2=fc6 a3=0 items=0 ppid=1800 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c908 key=(null) May 8 00:50:11.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3837002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:50:11.517809 sshd[5144]: pam_unix(sshd:session): session closed for user core May 8 00:50:11.518000 audit[5144]: USER_END pid=5144 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:11.518000 audit[5144]: CRED_DISP pid=5144 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:50:11.520500 systemd[1]: sshd@30-10.0.0.87:22-10.0.0.1:46238.service: Deactivated successfully. May 8 00:50:11.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.87:22-10.0.0.1:46238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:50:11.521272 systemd[1]: session-31.scope: Deactivated successfully. May 8 00:50:11.521904 systemd-logind[1192]: Session 31 logged out. Waiting for processes to exit. May 8 00:50:11.522656 systemd-logind[1192]: Removed session 31.