May 8 00:44:15.169273 kernel: Linux version 5.15.180-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 7 23:10:51 -00 2025 May 8 00:44:15.169307 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:44:15.169317 kernel: BIOS-provided physical RAM map: May 8 00:44:15.169324 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 8 00:44:15.169331 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 8 00:44:15.169337 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 8 00:44:15.169345 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 8 00:44:15.169353 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 8 00:44:15.169361 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 8 00:44:15.169368 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 8 00:44:15.169375 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 8 00:44:15.169381 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 8 00:44:15.169388 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 8 00:44:15.169395 kernel: NX (Execute Disable) protection: active May 8 00:44:15.169405 kernel: SMBIOS 2.8 present. May 8 00:44:15.169413 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 8 00:44:15.169420 kernel: Hypervisor detected: KVM May 8 00:44:15.169427 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 8 00:44:15.169435 kernel: kvm-clock: cpu 0, msr 9b198001, primary cpu clock May 8 00:44:15.169442 kernel: kvm-clock: using sched offset of 3265832909 cycles May 8 00:44:15.169450 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 8 00:44:15.169457 kernel: tsc: Detected 2794.748 MHz processor May 8 00:44:15.169465 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 8 00:44:15.169474 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 8 00:44:15.169482 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 8 00:44:15.169489 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 8 00:44:15.169497 kernel: Using GB pages for direct mapping May 8 00:44:15.169504 kernel: ACPI: Early table checksum verification disabled May 8 00:44:15.169512 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 8 00:44:15.169519 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:44:15.169530 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:44:15.169538 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:44:15.169547 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 8 00:44:15.169554 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:44:15.169562 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:44:15.169569 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:44:15.169577 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:44:15.169584 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 8 00:44:15.169592 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 8 00:44:15.169599 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 8 00:44:15.169611 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 8 00:44:15.169619 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 8 00:44:15.169627 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 8 00:44:15.169635 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 8 00:44:15.169643 kernel: No NUMA configuration found May 8 00:44:15.169651 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 8 00:44:15.169660 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 8 00:44:15.169668 kernel: Zone ranges: May 8 00:44:15.169676 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 8 00:44:15.169684 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 8 00:44:15.169692 kernel: Normal empty May 8 00:44:15.169700 kernel: Movable zone start for each node May 8 00:44:15.169708 kernel: Early memory node ranges May 8 00:44:15.169716 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 8 00:44:15.169724 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 8 00:44:15.169734 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 8 00:44:15.169744 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 8 00:44:15.169752 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 8 00:44:15.169760 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 8 00:44:15.169768 kernel: ACPI: PM-Timer IO Port: 0x608 May 8 00:44:15.169776 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 8 00:44:15.169784 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 8 00:44:15.169792 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 8 00:44:15.169800 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 8 00:44:15.169809 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 8 00:44:15.169818 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 8 00:44:15.169825 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 8 00:44:15.169833 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 8 00:44:15.169841 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 8 00:44:15.169849 kernel: TSC deadline timer available May 8 00:44:15.169857 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 8 00:44:15.169865 kernel: kvm-guest: KVM setup pv remote TLB flush May 8 00:44:15.169873 kernel: kvm-guest: setup PV sched yield May 8 00:44:15.169881 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 8 00:44:15.169890 kernel: Booting paravirtualized kernel on KVM May 8 00:44:15.169899 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 8 00:44:15.169922 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 8 00:44:15.169930 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 8 00:44:15.169938 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 8 00:44:15.169946 kernel: pcpu-alloc: [0] 0 1 2 3 May 8 00:44:15.169954 kernel: kvm-guest: setup async PF for cpu 0 May 8 00:44:15.169962 kernel: kvm-guest: stealtime: cpu 0, msr 9cc1c0c0 May 8 00:44:15.169970 kernel: kvm-guest: PV spinlocks enabled May 8 00:44:15.169980 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 8 00:44:15.169988 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 8 00:44:15.169996 kernel: Policy zone: DMA32 May 8 00:44:15.170006 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:44:15.170015 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 8 00:44:15.170023 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 8 00:44:15.170031 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 8 00:44:15.170039 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 8 00:44:15.170049 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2279K rwdata, 13724K rodata, 47464K init, 4116K bss, 134796K reserved, 0K cma-reserved) May 8 00:44:15.170057 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 8 00:44:15.170065 kernel: ftrace: allocating 34584 entries in 136 pages May 8 00:44:15.170081 kernel: ftrace: allocated 136 pages with 2 groups May 8 00:44:15.170089 kernel: rcu: Hierarchical RCU implementation. May 8 00:44:15.170098 kernel: rcu: RCU event tracing is enabled. May 8 00:44:15.170107 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 8 00:44:15.170115 kernel: Rude variant of Tasks RCU enabled. May 8 00:44:15.170123 kernel: Tracing variant of Tasks RCU enabled. May 8 00:44:15.170133 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 8 00:44:15.170141 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 8 00:44:15.170149 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 8 00:44:15.170157 kernel: random: crng init done May 8 00:44:15.170165 kernel: Console: colour VGA+ 80x25 May 8 00:44:15.170173 kernel: printk: console [ttyS0] enabled May 8 00:44:15.170181 kernel: ACPI: Core revision 20210730 May 8 00:44:15.170189 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 8 00:44:15.170197 kernel: APIC: Switch to symmetric I/O mode setup May 8 00:44:15.170207 kernel: x2apic enabled May 8 00:44:15.170215 kernel: Switched APIC routing to physical x2apic. May 8 00:44:15.170223 kernel: kvm-guest: setup PV IPIs May 8 00:44:15.170231 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 8 00:44:15.170239 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 8 00:44:15.170250 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 8 00:44:15.170258 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 8 00:44:15.170266 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 8 00:44:15.170274 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 8 00:44:15.170289 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 8 00:44:15.170298 kernel: Spectre V2 : Mitigation: Retpolines May 8 00:44:15.170308 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch May 8 00:44:15.170317 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT May 8 00:44:15.170325 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 8 00:44:15.170336 kernel: RETBleed: Mitigation: untrained return thunk May 8 00:44:15.170344 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 8 00:44:15.170353 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 8 00:44:15.170362 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 8 00:44:15.170372 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 8 00:44:15.170380 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 8 00:44:15.170389 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 8 00:44:15.170397 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 8 00:44:15.170405 kernel: Freeing SMP alternatives memory: 32K May 8 00:44:15.170414 kernel: pid_max: default: 32768 minimum: 301 May 8 00:44:15.170422 kernel: LSM: Security Framework initializing May 8 00:44:15.170432 kernel: SELinux: Initializing. May 8 00:44:15.170440 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:44:15.170449 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:44:15.170457 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 8 00:44:15.170466 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 8 00:44:15.170474 kernel: ... version: 0 May 8 00:44:15.170482 kernel: ... bit width: 48 May 8 00:44:15.170491 kernel: ... generic registers: 6 May 8 00:44:15.170499 kernel: ... value mask: 0000ffffffffffff May 8 00:44:15.170509 kernel: ... max period: 00007fffffffffff May 8 00:44:15.170517 kernel: ... fixed-purpose events: 0 May 8 00:44:15.170526 kernel: ... event mask: 000000000000003f May 8 00:44:15.170534 kernel: signal: max sigframe size: 1776 May 8 00:44:15.170542 kernel: rcu: Hierarchical SRCU implementation. May 8 00:44:15.170551 kernel: smp: Bringing up secondary CPUs ... May 8 00:44:15.170559 kernel: x86: Booting SMP configuration: May 8 00:44:15.170567 kernel: .... node #0, CPUs: #1 May 8 00:44:15.170576 kernel: kvm-clock: cpu 1, msr 9b198041, secondary cpu clock May 8 00:44:15.170585 kernel: kvm-guest: setup async PF for cpu 1 May 8 00:44:15.170594 kernel: kvm-guest: stealtime: cpu 1, msr 9cc9c0c0 May 8 00:44:15.170602 kernel: #2 May 8 00:44:15.170610 kernel: kvm-clock: cpu 2, msr 9b198081, secondary cpu clock May 8 00:44:15.170619 kernel: kvm-guest: setup async PF for cpu 2 May 8 00:44:15.170627 kernel: kvm-guest: stealtime: cpu 2, msr 9cd1c0c0 May 8 00:44:15.170635 kernel: #3 May 8 00:44:15.170643 kernel: kvm-clock: cpu 3, msr 9b1980c1, secondary cpu clock May 8 00:44:15.170651 kernel: kvm-guest: setup async PF for cpu 3 May 8 00:44:15.170660 kernel: kvm-guest: stealtime: cpu 3, msr 9cd9c0c0 May 8 00:44:15.170669 kernel: smp: Brought up 1 node, 4 CPUs May 8 00:44:15.170678 kernel: smpboot: Max logical packages: 1 May 8 00:44:15.170686 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 8 00:44:15.170694 kernel: devtmpfs: initialized May 8 00:44:15.170703 kernel: x86/mm: Memory block size: 128MB May 8 00:44:15.170711 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 8 00:44:15.170720 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 8 00:44:15.170728 kernel: pinctrl core: initialized pinctrl subsystem May 8 00:44:15.170736 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 8 00:44:15.170746 kernel: audit: initializing netlink subsys (disabled) May 8 00:44:15.170755 kernel: audit: type=2000 audit(1746665053.787:1): state=initialized audit_enabled=0 res=1 May 8 00:44:15.170763 kernel: thermal_sys: Registered thermal governor 'step_wise' May 8 00:44:15.170772 kernel: thermal_sys: Registered thermal governor 'user_space' May 8 00:44:15.170780 kernel: cpuidle: using governor menu May 8 00:44:15.170788 kernel: ACPI: bus type PCI registered May 8 00:44:15.170796 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 8 00:44:15.170805 kernel: dca service started, version 1.12.1 May 8 00:44:15.170813 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 8 00:44:15.170824 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 8 00:44:15.170832 kernel: PCI: Using configuration type 1 for base access May 8 00:44:15.170841 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 8 00:44:15.170849 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 8 00:44:15.170857 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 8 00:44:15.170866 kernel: ACPI: Added _OSI(Module Device) May 8 00:44:15.170874 kernel: ACPI: Added _OSI(Processor Device) May 8 00:44:15.170882 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 8 00:44:15.170891 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 8 00:44:15.170901 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 8 00:44:15.170918 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 8 00:44:15.170926 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 8 00:44:15.170935 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 8 00:44:15.170943 kernel: ACPI: Interpreter enabled May 8 00:44:15.170952 kernel: ACPI: PM: (supports S0 S3 S5) May 8 00:44:15.170960 kernel: ACPI: Using IOAPIC for interrupt routing May 8 00:44:15.170969 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 8 00:44:15.170977 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 8 00:44:15.170987 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 8 00:44:15.171167 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 8 00:44:15.171284 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 8 00:44:15.171386 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 8 00:44:15.171399 kernel: PCI host bridge to bus 0000:00 May 8 00:44:15.171506 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 8 00:44:15.171610 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 8 00:44:15.171702 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 8 00:44:15.171799 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 8 00:44:15.171891 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 8 00:44:15.171999 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 8 00:44:15.172102 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 8 00:44:15.172221 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 8 00:44:15.172372 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 8 00:44:15.172490 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 8 00:44:15.172595 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 8 00:44:15.172694 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 8 00:44:15.173493 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 8 00:44:15.173612 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 8 00:44:15.173717 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 8 00:44:15.173826 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 8 00:44:15.173947 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 8 00:44:15.174082 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 8 00:44:15.174196 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 8 00:44:15.174289 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 8 00:44:15.174377 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 8 00:44:15.174464 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 8 00:44:15.174542 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 8 00:44:15.174614 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 8 00:44:15.174774 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 8 00:44:15.174846 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 8 00:44:15.174950 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 8 00:44:15.175027 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 8 00:44:15.175118 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 8 00:44:15.175195 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 8 00:44:15.175267 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 8 00:44:15.175351 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 8 00:44:15.175424 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 8 00:44:15.175434 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 8 00:44:15.175442 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 8 00:44:15.175449 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 8 00:44:15.175458 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 8 00:44:15.175466 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 8 00:44:15.175473 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 8 00:44:15.175480 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 8 00:44:15.175487 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 8 00:44:15.175494 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 8 00:44:15.175500 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 8 00:44:15.175507 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 8 00:44:15.175514 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 8 00:44:15.175523 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 8 00:44:15.175532 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 8 00:44:15.175539 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 8 00:44:15.175548 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 8 00:44:15.175555 kernel: iommu: Default domain type: Translated May 8 00:44:15.175562 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 8 00:44:15.175636 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 8 00:44:15.175733 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 8 00:44:15.175837 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 8 00:44:15.175850 kernel: vgaarb: loaded May 8 00:44:15.175860 kernel: pps_core: LinuxPPS API ver. 1 registered May 8 00:44:15.175871 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 8 00:44:15.175881 kernel: PTP clock support registered May 8 00:44:15.175890 kernel: PCI: Using ACPI for IRQ routing May 8 00:44:15.175900 kernel: PCI: pci_cache_line_size set to 64 bytes May 8 00:44:15.175955 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 8 00:44:15.175965 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 8 00:44:15.175978 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 8 00:44:15.175988 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 8 00:44:15.175998 kernel: clocksource: Switched to clocksource kvm-clock May 8 00:44:15.176007 kernel: VFS: Disk quotas dquot_6.6.0 May 8 00:44:15.176018 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 8 00:44:15.176027 kernel: pnp: PnP ACPI init May 8 00:44:15.176165 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 8 00:44:15.176181 kernel: pnp: PnP ACPI: found 6 devices May 8 00:44:15.176195 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 8 00:44:15.176204 kernel: NET: Registered PF_INET protocol family May 8 00:44:15.176214 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 8 00:44:15.176224 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 8 00:44:15.176234 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 8 00:44:15.176244 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 8 00:44:15.176253 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 8 00:44:15.176263 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 8 00:44:15.176273 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:44:15.176285 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:44:15.176295 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 8 00:44:15.176304 kernel: NET: Registered PF_XDP protocol family May 8 00:44:15.176406 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 8 00:44:15.176504 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 8 00:44:15.176605 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 8 00:44:15.176701 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 8 00:44:15.176795 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 8 00:44:15.176895 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 8 00:44:15.176923 kernel: PCI: CLS 0 bytes, default 64 May 8 00:44:15.176932 kernel: Initialise system trusted keyrings May 8 00:44:15.176942 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 8 00:44:15.176951 kernel: Key type asymmetric registered May 8 00:44:15.176960 kernel: Asymmetric key parser 'x509' registered May 8 00:44:15.176969 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 8 00:44:15.176978 kernel: io scheduler mq-deadline registered May 8 00:44:15.176987 kernel: io scheduler kyber registered May 8 00:44:15.177001 kernel: io scheduler bfq registered May 8 00:44:15.177010 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 8 00:44:15.177020 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 8 00:44:15.177030 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 8 00:44:15.177040 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 8 00:44:15.177049 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 8 00:44:15.177059 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 8 00:44:15.177068 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 8 00:44:15.177087 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 8 00:44:15.177099 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 8 00:44:15.177234 kernel: rtc_cmos 00:04: RTC can wake from S4 May 8 00:44:15.177250 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 8 00:44:15.177386 kernel: rtc_cmos 00:04: registered as rtc0 May 8 00:44:15.177488 kernel: rtc_cmos 00:04: setting system clock to 2025-05-08T00:44:14 UTC (1746665054) May 8 00:44:15.177586 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 8 00:44:15.177599 kernel: NET: Registered PF_INET6 protocol family May 8 00:44:15.177609 kernel: Segment Routing with IPv6 May 8 00:44:15.177622 kernel: In-situ OAM (IOAM) with IPv6 May 8 00:44:15.177631 kernel: NET: Registered PF_PACKET protocol family May 8 00:44:15.177641 kernel: Key type dns_resolver registered May 8 00:44:15.177650 kernel: IPI shorthand broadcast: enabled May 8 00:44:15.177659 kernel: sched_clock: Marking stable (583002770, 457184300)->(1241265058, -201077988) May 8 00:44:15.177668 kernel: registered taskstats version 1 May 8 00:44:15.177678 kernel: Loading compiled-in X.509 certificates May 8 00:44:15.177687 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.180-flatcar: c9ff13353458e6fa2786638fdd3dcad841d1075c' May 8 00:44:15.177697 kernel: Key type .fscrypt registered May 8 00:44:15.177709 kernel: Key type fscrypt-provisioning registered May 8 00:44:15.177718 kernel: ima: No TPM chip found, activating TPM-bypass! May 8 00:44:15.177728 kernel: ima: Allocated hash algorithm: sha1 May 8 00:44:15.177737 kernel: ima: No architecture policies found May 8 00:44:15.177746 kernel: clk: Disabling unused clocks May 8 00:44:15.177756 kernel: Freeing unused kernel image (initmem) memory: 47464K May 8 00:44:15.177765 kernel: Write protecting the kernel read-only data: 28672k May 8 00:44:15.177774 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 8 00:44:15.177784 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 8 00:44:15.177795 kernel: Run /init as init process May 8 00:44:15.177805 kernel: with arguments: May 8 00:44:15.177814 kernel: /init May 8 00:44:15.177823 kernel: with environment: May 8 00:44:15.177832 kernel: HOME=/ May 8 00:44:15.177841 kernel: TERM=linux May 8 00:44:15.177851 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 8 00:44:15.177868 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:44:15.177882 systemd[1]: Detected virtualization kvm. May 8 00:44:15.177893 systemd[1]: Detected architecture x86-64. May 8 00:44:15.177916 systemd[1]: Running in initrd. May 8 00:44:15.177927 systemd[1]: No hostname configured, using default hostname. May 8 00:44:15.177937 systemd[1]: Hostname set to . May 8 00:44:15.177948 systemd[1]: Initializing machine ID from VM UUID. May 8 00:44:15.177958 systemd[1]: Queued start job for default target initrd.target. May 8 00:44:15.177968 systemd[1]: Started systemd-ask-password-console.path. May 8 00:44:15.177981 systemd[1]: Reached target cryptsetup.target. May 8 00:44:15.177991 systemd[1]: Reached target paths.target. May 8 00:44:15.178009 systemd[1]: Reached target slices.target. May 8 00:44:15.178021 systemd[1]: Reached target swap.target. May 8 00:44:15.178031 systemd[1]: Reached target timers.target. May 8 00:44:15.178042 systemd[1]: Listening on iscsid.socket. May 8 00:44:15.178054 systemd[1]: Listening on iscsiuio.socket. May 8 00:44:15.178064 systemd[1]: Listening on systemd-journald-audit.socket. May 8 00:44:15.178085 systemd[1]: Listening on systemd-journald-dev-log.socket. May 8 00:44:15.178096 systemd[1]: Listening on systemd-journald.socket. May 8 00:44:15.178106 systemd[1]: Listening on systemd-networkd.socket. May 8 00:44:15.178116 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:44:15.178127 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:44:15.178137 systemd[1]: Reached target sockets.target. May 8 00:44:15.178149 systemd[1]: Starting kmod-static-nodes.service... May 8 00:44:15.178160 systemd[1]: Finished network-cleanup.service. May 8 00:44:15.178170 systemd[1]: Starting systemd-fsck-usr.service... May 8 00:44:15.178180 systemd[1]: Starting systemd-journald.service... May 8 00:44:15.178190 systemd[1]: Starting systemd-modules-load.service... May 8 00:44:15.178200 systemd[1]: Starting systemd-resolved.service... May 8 00:44:15.178211 systemd[1]: Starting systemd-vconsole-setup.service... May 8 00:44:15.178221 systemd[1]: Finished kmod-static-nodes.service. May 8 00:44:15.178231 systemd[1]: Finished systemd-fsck-usr.service. May 8 00:44:15.178244 kernel: audit: type=1130 audit(1746665055.167:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.178254 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:44:15.178264 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:44:15.178280 systemd-journald[198]: Journal started May 8 00:44:15.178334 systemd-journald[198]: Runtime Journal (/run/log/journal/dde782d8554d451a8087d4fb5c1b8eff) is 6.0M, max 48.5M, 42.5M free. May 8 00:44:15.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.177407 systemd-modules-load[199]: Inserted module 'overlay' May 8 00:44:15.218124 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 8 00:44:15.218163 systemd[1]: Started systemd-journald.service. May 8 00:44:15.218179 kernel: audit: type=1130 audit(1746665055.214:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.195194 systemd-resolved[200]: Positive Trust Anchors: May 8 00:44:15.224023 kernel: Bridge firewalling registered May 8 00:44:15.195214 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:44:15.233956 kernel: audit: type=1130 audit(1746665055.222:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.233985 kernel: audit: type=1130 audit(1746665055.223:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.195244 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:44:15.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.197773 systemd-resolved[200]: Defaulting to hostname 'linux'. May 8 00:44:15.247788 kernel: audit: type=1130 audit(1746665055.233:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.223243 systemd[1]: Started systemd-resolved.service. May 8 00:44:15.223994 systemd-modules-load[199]: Inserted module 'br_netfilter' May 8 00:44:15.233349 systemd[1]: Finished systemd-vconsole-setup.service. May 8 00:44:15.234648 systemd[1]: Reached target nss-lookup.target. May 8 00:44:15.247806 systemd[1]: Starting dracut-cmdline-ask.service... May 8 00:44:15.260951 kernel: SCSI subsystem initialized May 8 00:44:15.266601 systemd[1]: Finished dracut-cmdline-ask.service. May 8 00:44:15.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.268269 systemd[1]: Starting dracut-cmdline.service... May 8 00:44:15.273873 kernel: audit: type=1130 audit(1746665055.266:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.277009 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 8 00:44:15.277083 kernel: device-mapper: uevent: version 1.0.3 May 8 00:44:15.278521 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 8 00:44:15.280581 dracut-cmdline[216]: dracut-dracut-053 May 8 00:44:15.281831 systemd-modules-load[199]: Inserted module 'dm_multipath' May 8 00:44:15.282706 systemd[1]: Finished systemd-modules-load.service. May 8 00:44:15.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.284999 systemd[1]: Starting systemd-sysctl.service... May 8 00:44:15.289795 kernel: audit: type=1130 audit(1746665055.283:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.290593 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:44:15.297584 systemd[1]: Finished systemd-sysctl.service. May 8 00:44:15.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.302932 kernel: audit: type=1130 audit(1746665055.297:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.367959 kernel: Loading iSCSI transport class v2.0-870. May 8 00:44:15.384963 kernel: iscsi: registered transport (tcp) May 8 00:44:15.407961 kernel: iscsi: registered transport (qla4xxx) May 8 00:44:15.408056 kernel: QLogic iSCSI HBA Driver May 8 00:44:15.438220 systemd[1]: Finished dracut-cmdline.service. May 8 00:44:15.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.439933 systemd[1]: Starting dracut-pre-udev.service... May 8 00:44:15.445532 kernel: audit: type=1130 audit(1746665055.437:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.486958 kernel: raid6: avx2x4 gen() 27606 MB/s May 8 00:44:15.503939 kernel: raid6: avx2x4 xor() 6491 MB/s May 8 00:44:15.520938 kernel: raid6: avx2x2 gen() 22844 MB/s May 8 00:44:15.537932 kernel: raid6: avx2x2 xor() 13508 MB/s May 8 00:44:15.554943 kernel: raid6: avx2x1 gen() 21046 MB/s May 8 00:44:15.571934 kernel: raid6: avx2x1 xor() 14924 MB/s May 8 00:44:15.588931 kernel: raid6: sse2x4 gen() 14317 MB/s May 8 00:44:15.605931 kernel: raid6: sse2x4 xor() 7508 MB/s May 8 00:44:15.622944 kernel: raid6: sse2x2 gen() 14941 MB/s May 8 00:44:15.639930 kernel: raid6: sse2x2 xor() 9415 MB/s May 8 00:44:15.656934 kernel: raid6: sse2x1 gen() 11683 MB/s May 8 00:44:15.674344 kernel: raid6: sse2x1 xor() 7352 MB/s May 8 00:44:15.674374 kernel: raid6: using algorithm avx2x4 gen() 27606 MB/s May 8 00:44:15.674387 kernel: raid6: .... xor() 6491 MB/s, rmw enabled May 8 00:44:15.675074 kernel: raid6: using avx2x2 recovery algorithm May 8 00:44:15.687932 kernel: xor: automatically using best checksumming function avx May 8 00:44:15.777959 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 8 00:44:15.784872 systemd[1]: Finished dracut-pre-udev.service. May 8 00:44:15.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.785000 audit: BPF prog-id=7 op=LOAD May 8 00:44:15.785000 audit: BPF prog-id=8 op=LOAD May 8 00:44:15.787126 systemd[1]: Starting systemd-udevd.service... May 8 00:44:15.800856 systemd-udevd[399]: Using default interface naming scheme 'v252'. May 8 00:44:15.806243 systemd[1]: Started systemd-udevd.service. May 8 00:44:15.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.809015 systemd[1]: Starting dracut-pre-trigger.service... May 8 00:44:15.822321 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation May 8 00:44:15.854068 systemd[1]: Finished dracut-pre-trigger.service. May 8 00:44:15.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.855408 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:44:15.890279 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:44:15.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:15.932371 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 8 00:44:15.939568 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 8 00:44:15.939590 kernel: GPT:9289727 != 19775487 May 8 00:44:15.939603 kernel: GPT:Alternate GPT header not at the end of the disk. May 8 00:44:15.939616 kernel: GPT:9289727 != 19775487 May 8 00:44:15.939628 kernel: GPT: Use GNU Parted to correct GPT errors. May 8 00:44:15.939648 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:44:15.946952 kernel: cryptd: max_cpu_qlen set to 1000 May 8 00:44:15.958960 kernel: AVX2 version of gcm_enc/dec engaged. May 8 00:44:15.961935 kernel: AES CTR mode by8 optimization enabled May 8 00:44:15.963929 kernel: libata version 3.00 loaded. May 8 00:44:16.012939 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (453) May 8 00:44:16.012997 kernel: ahci 0000:00:1f.2: version 3.0 May 8 00:44:16.024244 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 8 00:44:16.024259 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 8 00:44:16.024362 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 8 00:44:16.024443 kernel: scsi host0: ahci May 8 00:44:16.024546 kernel: scsi host1: ahci May 8 00:44:16.024654 kernel: scsi host2: ahci May 8 00:44:16.024751 kernel: scsi host3: ahci May 8 00:44:16.024842 kernel: scsi host4: ahci May 8 00:44:16.024971 kernel: scsi host5: ahci May 8 00:44:16.025071 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 8 00:44:16.025082 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 8 00:44:16.025091 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 8 00:44:16.025100 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 8 00:44:16.025109 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 8 00:44:16.025118 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 8 00:44:16.018136 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 8 00:44:16.065222 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 8 00:44:16.065560 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 8 00:44:16.076276 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 8 00:44:16.081039 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:44:16.082417 systemd[1]: Starting disk-uuid.service... May 8 00:44:16.093583 disk-uuid[527]: Primary Header is updated. May 8 00:44:16.093583 disk-uuid[527]: Secondary Entries is updated. May 8 00:44:16.093583 disk-uuid[527]: Secondary Header is updated. May 8 00:44:16.121644 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:44:16.125946 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:44:16.333782 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 8 00:44:16.333870 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 8 00:44:16.333883 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 8 00:44:16.334952 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 8 00:44:16.336946 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 8 00:44:16.337976 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 8 00:44:16.338943 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 8 00:44:16.339945 kernel: ata3.00: applying bridge limits May 8 00:44:16.340947 kernel: ata3.00: configured for UDMA/100 May 8 00:44:16.342936 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 8 00:44:16.375099 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 8 00:44:16.393866 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 8 00:44:16.393885 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 8 00:44:17.148936 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:44:17.149185 disk-uuid[528]: The operation has completed successfully. May 8 00:44:17.174577 systemd[1]: disk-uuid.service: Deactivated successfully. May 8 00:44:17.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.174673 systemd[1]: Finished disk-uuid.service. May 8 00:44:17.180221 systemd[1]: Starting verity-setup.service... May 8 00:44:17.198935 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 8 00:44:17.218635 systemd[1]: Found device dev-mapper-usr.device. May 8 00:44:17.222046 systemd[1]: Mounting sysusr-usr.mount... May 8 00:44:17.225386 systemd[1]: Finished verity-setup.service. May 8 00:44:17.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.339930 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:44:17.340138 systemd[1]: Mounted sysusr-usr.mount. May 8 00:44:17.340592 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 8 00:44:17.341662 systemd[1]: Starting ignition-setup.service... May 8 00:44:17.344820 systemd[1]: Starting parse-ip-for-networkd.service... May 8 00:44:17.355241 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:44:17.355269 kernel: BTRFS info (device vda6): using free space tree May 8 00:44:17.355279 kernel: BTRFS info (device vda6): has skinny extents May 8 00:44:17.363257 systemd[1]: mnt-oem.mount: Deactivated successfully. May 8 00:44:17.424227 systemd[1]: Finished parse-ip-for-networkd.service. May 8 00:44:17.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.441000 audit: BPF prog-id=9 op=LOAD May 8 00:44:17.442097 systemd[1]: Starting systemd-networkd.service... May 8 00:44:17.463524 systemd-networkd[710]: lo: Link UP May 8 00:44:17.463533 systemd-networkd[710]: lo: Gained carrier May 8 00:44:17.475254 systemd-networkd[710]: Enumeration completed May 8 00:44:17.475358 systemd[1]: Started systemd-networkd.service. May 8 00:44:17.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.475918 systemd[1]: Reached target network.target. May 8 00:44:17.478415 systemd[1]: Starting iscsiuio.service... May 8 00:44:17.479559 systemd-networkd[710]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:44:17.480819 systemd-networkd[710]: eth0: Link UP May 8 00:44:17.480823 systemd-networkd[710]: eth0: Gained carrier May 8 00:44:17.498964 systemd[1]: Started iscsiuio.service. May 8 00:44:17.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.501630 systemd[1]: Starting iscsid.service... May 8 00:44:17.504887 iscsid[715]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 8 00:44:17.504887 iscsid[715]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 8 00:44:17.504887 iscsid[715]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 8 00:44:17.504887 iscsid[715]: If using hardware iscsi like qla4xxx this message can be ignored. May 8 00:44:17.504887 iscsid[715]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 8 00:44:17.504887 iscsid[715]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 8 00:44:17.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.507358 systemd[1]: Started iscsid.service. May 8 00:44:17.513602 systemd[1]: Starting dracut-initqueue.service... May 8 00:44:17.515129 systemd-networkd[710]: eth0: DHCPv4 address 10.0.0.60/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:44:17.519560 systemd[1]: Finished ignition-setup.service. May 8 00:44:17.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.524632 systemd[1]: Starting ignition-fetch-offline.service... May 8 00:44:17.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.527077 systemd[1]: Finished dracut-initqueue.service. May 8 00:44:17.528216 systemd[1]: Reached target remote-fs-pre.target. May 8 00:44:17.529374 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:44:17.530655 systemd[1]: Reached target remote-fs.target. May 8 00:44:17.534756 systemd[1]: Starting dracut-pre-mount.service... May 8 00:44:17.612981 systemd[1]: Finished dracut-pre-mount.service. May 8 00:44:17.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.763274 ignition[724]: Ignition 2.14.0 May 8 00:44:17.763292 ignition[724]: Stage: fetch-offline May 8 00:44:17.763410 ignition[724]: no configs at "/usr/lib/ignition/base.d" May 8 00:44:17.763436 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:44:17.763624 ignition[724]: parsed url from cmdline: "" May 8 00:44:17.767299 systemd-resolved[200]: Detected conflict on linux IN A 10.0.0.60 May 8 00:44:17.763628 ignition[724]: no config URL provided May 8 00:44:17.767310 systemd-resolved[200]: Hostname conflict, changing published hostname from 'linux' to 'linux3'. May 8 00:44:17.763634 ignition[724]: reading system config file "/usr/lib/ignition/user.ign" May 8 00:44:17.763644 ignition[724]: no config at "/usr/lib/ignition/user.ign" May 8 00:44:17.763672 ignition[724]: op(1): [started] loading QEMU firmware config module May 8 00:44:17.764315 ignition[724]: op(1): executing: "modprobe" "qemu_fw_cfg" May 8 00:44:17.772301 ignition[724]: op(1): [finished] loading QEMU firmware config module May 8 00:44:17.813200 ignition[724]: parsing config with SHA512: 666a9696e83c3351027245d04390c0037d392b757ee9b390bff21436f6607bbe139b9d0d5c64678149552940a31b908106c8ac9ee1a5615579d92dac7717781a May 8 00:44:17.865989 unknown[724]: fetched base config from "system" May 8 00:44:17.866016 unknown[724]: fetched user config from "qemu" May 8 00:44:17.866625 ignition[724]: fetch-offline: fetch-offline passed May 8 00:44:17.866776 ignition[724]: Ignition finished successfully May 8 00:44:17.871255 systemd[1]: Finished ignition-fetch-offline.service. May 8 00:44:17.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.871877 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 8 00:44:17.873614 systemd[1]: Starting ignition-kargs.service... May 8 00:44:17.891404 ignition[738]: Ignition 2.14.0 May 8 00:44:17.891418 ignition[738]: Stage: kargs May 8 00:44:17.891621 ignition[738]: no configs at "/usr/lib/ignition/base.d" May 8 00:44:17.891638 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:44:17.896982 ignition[738]: kargs: kargs passed May 8 00:44:17.909022 ignition[738]: Ignition finished successfully May 8 00:44:17.910267 systemd[1]: Finished ignition-kargs.service. May 8 00:44:17.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.913116 systemd[1]: Starting ignition-disks.service... May 8 00:44:17.929207 ignition[744]: Ignition 2.14.0 May 8 00:44:17.929220 ignition[744]: Stage: disks May 8 00:44:17.929381 ignition[744]: no configs at "/usr/lib/ignition/base.d" May 8 00:44:17.929395 ignition[744]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:44:17.931071 ignition[744]: disks: disks passed May 8 00:44:17.931126 ignition[744]: Ignition finished successfully May 8 00:44:17.935087 systemd[1]: Finished ignition-disks.service. May 8 00:44:17.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:17.937018 systemd[1]: Reached target initrd-root-device.target. May 8 00:44:17.937549 systemd[1]: Reached target local-fs-pre.target. May 8 00:44:17.939233 systemd[1]: Reached target local-fs.target. May 8 00:44:17.940940 systemd[1]: Reached target sysinit.target. May 8 00:44:17.942643 systemd[1]: Reached target basic.target. May 8 00:44:17.944119 systemd[1]: Starting systemd-fsck-root.service... May 8 00:44:17.996093 systemd-fsck[752]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 8 00:44:18.482021 systemd[1]: Finished systemd-fsck-root.service. May 8 00:44:18.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:18.485115 systemd[1]: Mounting sysroot.mount... May 8 00:44:18.514938 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 8 00:44:18.514928 systemd[1]: Mounted sysroot.mount. May 8 00:44:18.515267 systemd[1]: Reached target initrd-root-fs.target. May 8 00:44:18.517862 systemd[1]: Mounting sysroot-usr.mount... May 8 00:44:18.518575 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 8 00:44:18.518620 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 8 00:44:18.518643 systemd[1]: Reached target ignition-diskful.target. May 8 00:44:18.526534 systemd[1]: Mounted sysroot-usr.mount. May 8 00:44:18.528891 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:44:18.529940 systemd[1]: Starting initrd-setup-root.service... May 8 00:44:18.553227 initrd-setup-root[763]: cut: /sysroot/etc/passwd: No such file or directory May 8 00:44:18.555772 initrd-setup-root[771]: cut: /sysroot/etc/group: No such file or directory May 8 00:44:18.559324 initrd-setup-root[779]: cut: /sysroot/etc/shadow: No such file or directory May 8 00:44:18.562939 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (758) May 8 00:44:18.563498 initrd-setup-root[787]: cut: /sysroot/etc/gshadow: No such file or directory May 8 00:44:18.567226 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:44:18.567262 kernel: BTRFS info (device vda6): using free space tree May 8 00:44:18.567271 kernel: BTRFS info (device vda6): has skinny extents May 8 00:44:18.569915 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:44:18.594670 systemd[1]: Finished initrd-setup-root.service. May 8 00:44:18.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:18.608783 systemd[1]: Starting ignition-mount.service... May 8 00:44:18.610630 systemd[1]: Starting sysroot-boot.service... May 8 00:44:18.616921 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 8 00:44:18.617032 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 8 00:44:18.629452 systemd[1]: Finished sysroot-boot.service. May 8 00:44:18.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:18.652417 ignition[827]: INFO : Ignition 2.14.0 May 8 00:44:18.652417 ignition[827]: INFO : Stage: mount May 8 00:44:18.654358 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:44:18.654358 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:44:18.657808 ignition[827]: INFO : mount: mount passed May 8 00:44:18.658664 ignition[827]: INFO : Ignition finished successfully May 8 00:44:18.660578 systemd[1]: Finished ignition-mount.service. May 8 00:44:18.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:18.663313 systemd[1]: Starting ignition-files.service... May 8 00:44:18.671384 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:44:18.680754 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (834) May 8 00:44:18.680789 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:44:18.680802 kernel: BTRFS info (device vda6): using free space tree May 8 00:44:18.681702 kernel: BTRFS info (device vda6): has skinny extents May 8 00:44:18.686603 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:44:18.784553 ignition[853]: INFO : Ignition 2.14.0 May 8 00:44:18.784553 ignition[853]: INFO : Stage: files May 8 00:44:18.786460 ignition[853]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:44:18.786460 ignition[853]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:44:18.789386 ignition[853]: DEBUG : files: compiled without relabeling support, skipping May 8 00:44:18.789386 ignition[853]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 8 00:44:18.789386 ignition[853]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 8 00:44:18.789386 ignition[853]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 8 00:44:18.789386 ignition[853]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 8 00:44:18.797952 ignition[853]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 8 00:44:18.797952 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 8 00:44:18.797952 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 8 00:44:18.789990 unknown[853]: wrote ssh authorized keys file for user: core May 8 00:44:18.890780 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 8 00:44:19.116313 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 8 00:44:19.116313 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:44:19.120561 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 8 00:44:19.422124 systemd-networkd[710]: eth0: Gained IPv6LL May 8 00:44:19.460562 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 8 00:44:20.101773 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:44:20.101773 ignition[853]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 8 00:44:20.105948 ignition[853]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:44:20.105948 ignition[853]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 8 00:44:20.105948 ignition[853]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 8 00:44:20.105948 ignition[853]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 8 00:44:20.112231 ignition[853]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:44:20.112231 ignition[853]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:44:20.116024 ignition[853]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 8 00:44:20.116024 ignition[853]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 8 00:44:20.118654 ignition[853]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 8 00:44:20.118654 ignition[853]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 8 00:44:20.118654 ignition[853]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:44:20.186830 ignition[853]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:44:20.200094 ignition[853]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 8 00:44:20.200094 ignition[853]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 8 00:44:20.200094 ignition[853]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 8 00:44:20.200094 ignition[853]: INFO : files: files passed May 8 00:44:20.200094 ignition[853]: INFO : Ignition finished successfully May 8 00:44:20.205538 systemd[1]: Finished ignition-files.service. May 8 00:44:20.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.208568 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 8 00:44:20.214855 kernel: kauditd_printk_skb: 24 callbacks suppressed May 8 00:44:20.214881 kernel: audit: type=1130 audit(1746665060.207:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.212440 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 8 00:44:20.213302 systemd[1]: Starting ignition-quench.service... May 8 00:44:20.222911 kernel: audit: type=1130 audit(1746665060.217:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.215003 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 8 00:44:20.231281 kernel: audit: type=1130 audit(1746665060.222:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.231299 kernel: audit: type=1131 audit(1746665060.222:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.231339 initrd-setup-root-after-ignition[876]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 8 00:44:20.218061 systemd[1]: ignition-quench.service: Deactivated successfully. May 8 00:44:20.234030 initrd-setup-root-after-ignition[879]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 8 00:44:20.218127 systemd[1]: Finished ignition-quench.service. May 8 00:44:20.223038 systemd[1]: Reached target ignition-complete.target. May 8 00:44:20.230309 systemd[1]: Starting initrd-parse-etc.service... May 8 00:44:20.242375 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 8 00:44:20.242464 systemd[1]: Finished initrd-parse-etc.service. May 8 00:44:20.252020 kernel: audit: type=1130 audit(1746665060.244:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.252042 kernel: audit: type=1131 audit(1746665060.244:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.244405 systemd[1]: Reached target initrd-fs.target. May 8 00:44:20.252045 systemd[1]: Reached target initrd.target. May 8 00:44:20.252877 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 8 00:44:20.253718 systemd[1]: Starting dracut-pre-pivot.service... May 8 00:44:20.264975 systemd[1]: Finished dracut-pre-pivot.service. May 8 00:44:20.270246 kernel: audit: type=1130 audit(1746665060.264:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.266714 systemd[1]: Starting initrd-cleanup.service... May 8 00:44:20.277361 systemd[1]: Stopped target nss-lookup.target. May 8 00:44:20.279362 systemd[1]: Stopped target remote-cryptsetup.target. May 8 00:44:20.280505 systemd[1]: Stopped target timers.target. May 8 00:44:20.282260 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 8 00:44:20.288675 kernel: audit: type=1131 audit(1746665060.283:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.282438 systemd[1]: Stopped dracut-pre-pivot.service. May 8 00:44:20.283996 systemd[1]: Stopped target initrd.target. May 8 00:44:20.288931 systemd[1]: Stopped target basic.target. May 8 00:44:20.290554 systemd[1]: Stopped target ignition-complete.target. May 8 00:44:20.292339 systemd[1]: Stopped target ignition-diskful.target. May 8 00:44:20.294202 systemd[1]: Stopped target initrd-root-device.target. May 8 00:44:20.296153 systemd[1]: Stopped target remote-fs.target. May 8 00:44:20.298048 systemd[1]: Stopped target remote-fs-pre.target. May 8 00:44:20.300032 systemd[1]: Stopped target sysinit.target. May 8 00:44:20.301679 systemd[1]: Stopped target local-fs.target. May 8 00:44:20.303612 systemd[1]: Stopped target local-fs-pre.target. May 8 00:44:20.305445 systemd[1]: Stopped target swap.target. May 8 00:44:20.314042 kernel: audit: type=1131 audit(1746665060.308:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.307045 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 8 00:44:20.307218 systemd[1]: Stopped dracut-pre-mount.service. May 8 00:44:20.321852 kernel: audit: type=1131 audit(1746665060.316:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.309261 systemd[1]: Stopped target cryptsetup.target. May 8 00:44:20.314096 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 8 00:44:20.314191 systemd[1]: Stopped dracut-initqueue.service. May 8 00:44:20.316292 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 8 00:44:20.316386 systemd[1]: Stopped ignition-fetch-offline.service. May 8 00:44:20.320656 systemd[1]: Stopped target paths.target. May 8 00:44:20.320735 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 8 00:44:20.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.324038 systemd[1]: Stopped systemd-ask-password-console.path. May 8 00:44:20.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.326040 systemd[1]: Stopped target slices.target. May 8 00:44:20.328008 systemd[1]: Stopped target sockets.target. May 8 00:44:20.337413 iscsid[715]: iscsid shutting down. May 8 00:44:20.329753 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 8 00:44:20.329921 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 8 00:44:20.331682 systemd[1]: ignition-files.service: Deactivated successfully. May 8 00:44:20.331801 systemd[1]: Stopped ignition-files.service. May 8 00:44:20.334803 systemd[1]: Stopping ignition-mount.service... May 8 00:44:20.343845 ignition[893]: INFO : Ignition 2.14.0 May 8 00:44:20.343845 ignition[893]: INFO : Stage: umount May 8 00:44:20.343845 ignition[893]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:44:20.343845 ignition[893]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:44:20.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.336305 systemd[1]: Stopping iscsid.service... May 8 00:44:20.337402 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 8 00:44:20.337555 systemd[1]: Stopped kmod-static-nodes.service. May 8 00:44:20.345362 ignition[893]: INFO : umount: umount passed May 8 00:44:20.345362 ignition[893]: INFO : Ignition finished successfully May 8 00:44:20.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.339983 systemd[1]: Stopping sysroot-boot.service... May 8 00:44:20.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.340863 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 8 00:44:20.341039 systemd[1]: Stopped systemd-udev-trigger.service. May 8 00:44:20.351688 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 8 00:44:20.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.351852 systemd[1]: Stopped dracut-pre-trigger.service. May 8 00:44:20.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.355835 systemd[1]: iscsid.service: Deactivated successfully. May 8 00:44:20.355961 systemd[1]: Stopped iscsid.service. May 8 00:44:20.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.356746 systemd[1]: ignition-mount.service: Deactivated successfully. May 8 00:44:20.356819 systemd[1]: Stopped ignition-mount.service. May 8 00:44:20.359769 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 8 00:44:20.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.359856 systemd[1]: Finished initrd-cleanup.service. May 8 00:44:20.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.361894 systemd[1]: iscsid.socket: Deactivated successfully. May 8 00:44:20.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.361959 systemd[1]: Closed iscsid.socket. May 8 00:44:20.362419 systemd[1]: ignition-disks.service: Deactivated successfully. May 8 00:44:20.362452 systemd[1]: Stopped ignition-disks.service. May 8 00:44:20.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.364465 systemd[1]: ignition-kargs.service: Deactivated successfully. May 8 00:44:20.364505 systemd[1]: Stopped ignition-kargs.service. May 8 00:44:20.365887 systemd[1]: ignition-setup.service: Deactivated successfully. May 8 00:44:20.365942 systemd[1]: Stopped ignition-setup.service. May 8 00:44:20.367624 systemd[1]: Stopping iscsiuio.service... May 8 00:44:20.370731 systemd[1]: iscsiuio.service: Deactivated successfully. May 8 00:44:20.370832 systemd[1]: Stopped iscsiuio.service. May 8 00:44:20.371474 systemd[1]: Stopped target network.target. May 8 00:44:20.371736 systemd[1]: iscsiuio.socket: Deactivated successfully. May 8 00:44:20.371772 systemd[1]: Closed iscsiuio.socket. May 8 00:44:20.372352 systemd[1]: Stopping systemd-networkd.service... May 8 00:44:20.375794 systemd[1]: Stopping systemd-resolved.service... May 8 00:44:20.383966 systemd-networkd[710]: eth0: DHCPv6 lease lost May 8 00:44:20.384997 systemd[1]: systemd-resolved.service: Deactivated successfully. May 8 00:44:20.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.385091 systemd[1]: Stopped systemd-resolved.service. May 8 00:44:20.388132 systemd[1]: systemd-networkd.service: Deactivated successfully. May 8 00:44:20.388224 systemd[1]: Stopped systemd-networkd.service. May 8 00:44:20.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.387000 audit: BPF prog-id=6 op=UNLOAD May 8 00:44:20.390227 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 8 00:44:20.390264 systemd[1]: Closed systemd-networkd.socket. May 8 00:44:20.391822 systemd[1]: Stopping network-cleanup.service... May 8 00:44:20.393631 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 8 00:44:20.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.393680 systemd[1]: Stopped parse-ip-for-networkd.service. May 8 00:44:20.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.396000 audit: BPF prog-id=9 op=UNLOAD May 8 00:44:20.394174 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 8 00:44:20.394205 systemd[1]: Stopped systemd-sysctl.service. May 8 00:44:20.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.397964 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 8 00:44:20.398001 systemd[1]: Stopped systemd-modules-load.service. May 8 00:44:20.398812 systemd[1]: Stopping systemd-udevd.service... May 8 00:44:20.404737 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 8 00:44:20.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.408470 systemd[1]: network-cleanup.service: Deactivated successfully. May 8 00:44:20.408565 systemd[1]: Stopped network-cleanup.service. May 8 00:44:20.411169 systemd[1]: systemd-udevd.service: Deactivated successfully. May 8 00:44:20.412066 systemd[1]: Stopped systemd-udevd.service. May 8 00:44:20.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.416444 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 8 00:44:20.417793 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 8 00:44:20.417842 systemd[1]: Closed systemd-udevd-control.socket. May 8 00:44:20.420583 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 8 00:44:20.420628 systemd[1]: Closed systemd-udevd-kernel.socket. May 8 00:44:20.422580 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 8 00:44:20.423485 systemd[1]: Stopped dracut-pre-udev.service. May 8 00:44:20.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.425542 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 8 00:44:20.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.426329 systemd[1]: Stopped dracut-cmdline.service. May 8 00:44:20.428280 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 8 00:44:20.428319 systemd[1]: Stopped dracut-cmdline-ask.service. May 8 00:44:20.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.432780 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 8 00:44:20.434675 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 8 00:44:20.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.434720 systemd[1]: Stopped systemd-vconsole-setup.service. May 8 00:44:20.439378 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 8 00:44:20.439490 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 8 00:44:20.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.493630 systemd[1]: sysroot-boot.service: Deactivated successfully. May 8 00:44:20.493749 systemd[1]: Stopped sysroot-boot.service. May 8 00:44:20.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.496268 systemd[1]: Reached target initrd-switch-root.target. May 8 00:44:20.498020 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 8 00:44:20.499000 systemd[1]: Stopped initrd-setup-root.service. May 8 00:44:20.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:20.501270 systemd[1]: Starting initrd-switch-root.service... May 8 00:44:20.518360 systemd[1]: Switching root. May 8 00:44:20.536881 systemd-journald[198]: Journal stopped May 8 00:44:24.102150 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). May 8 00:44:24.102204 kernel: SELinux: Class mctp_socket not defined in policy. May 8 00:44:24.102219 kernel: SELinux: Class anon_inode not defined in policy. May 8 00:44:24.102233 kernel: SELinux: the above unknown classes and permissions will be allowed May 8 00:44:24.102246 kernel: SELinux: policy capability network_peer_controls=1 May 8 00:44:24.102255 kernel: SELinux: policy capability open_perms=1 May 8 00:44:24.102265 kernel: SELinux: policy capability extended_socket_class=1 May 8 00:44:24.102275 kernel: SELinux: policy capability always_check_network=0 May 8 00:44:24.102289 kernel: SELinux: policy capability cgroup_seclabel=1 May 8 00:44:24.102302 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 8 00:44:24.102312 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 8 00:44:24.102325 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 8 00:44:24.102338 systemd[1]: Successfully loaded SELinux policy in 83.288ms. May 8 00:44:24.102358 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.884ms. May 8 00:44:24.102372 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:44:24.102386 systemd[1]: Detected virtualization kvm. May 8 00:44:24.102400 systemd[1]: Detected architecture x86-64. May 8 00:44:24.102413 systemd[1]: Detected first boot. May 8 00:44:24.102428 systemd[1]: Initializing machine ID from VM UUID. May 8 00:44:24.102442 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 8 00:44:24.102455 systemd[1]: Populated /etc with preset unit settings. May 8 00:44:24.102468 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:44:24.102479 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:44:24.102492 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:44:24.102504 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 8 00:44:24.102514 systemd[1]: Stopped initrd-switch-root.service. May 8 00:44:24.102528 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 8 00:44:24.102539 systemd[1]: Created slice system-addon\x2dconfig.slice. May 8 00:44:24.102549 systemd[1]: Created slice system-addon\x2drun.slice. May 8 00:44:24.102560 systemd[1]: Created slice system-getty.slice. May 8 00:44:24.102570 systemd[1]: Created slice system-modprobe.slice. May 8 00:44:24.102581 systemd[1]: Created slice system-serial\x2dgetty.slice. May 8 00:44:24.102593 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 8 00:44:24.102604 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 8 00:44:24.102615 systemd[1]: Created slice user.slice. May 8 00:44:24.102626 systemd[1]: Started systemd-ask-password-console.path. May 8 00:44:24.102636 systemd[1]: Started systemd-ask-password-wall.path. May 8 00:44:24.102647 systemd[1]: Set up automount boot.automount. May 8 00:44:24.102677 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 8 00:44:24.102688 systemd[1]: Stopped target initrd-switch-root.target. May 8 00:44:24.102698 systemd[1]: Stopped target initrd-fs.target. May 8 00:44:24.102711 systemd[1]: Stopped target initrd-root-fs.target. May 8 00:44:24.102722 systemd[1]: Reached target integritysetup.target. May 8 00:44:24.102732 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:44:24.102744 systemd[1]: Reached target remote-fs.target. May 8 00:44:24.102754 systemd[1]: Reached target slices.target. May 8 00:44:24.102766 systemd[1]: Reached target swap.target. May 8 00:44:24.102777 systemd[1]: Reached target torcx.target. May 8 00:44:24.102787 systemd[1]: Reached target veritysetup.target. May 8 00:44:24.102799 systemd[1]: Listening on systemd-coredump.socket. May 8 00:44:24.102809 systemd[1]: Listening on systemd-initctl.socket. May 8 00:44:24.102819 systemd[1]: Listening on systemd-networkd.socket. May 8 00:44:24.102837 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:44:24.102847 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:44:24.102858 systemd[1]: Listening on systemd-userdbd.socket. May 8 00:44:24.102874 systemd[1]: Mounting dev-hugepages.mount... May 8 00:44:24.102884 systemd[1]: Mounting dev-mqueue.mount... May 8 00:44:24.102895 systemd[1]: Mounting media.mount... May 8 00:44:24.102960 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:44:24.102974 systemd[1]: Mounting sys-kernel-debug.mount... May 8 00:44:24.102984 systemd[1]: Mounting sys-kernel-tracing.mount... May 8 00:44:24.102995 systemd[1]: Mounting tmp.mount... May 8 00:44:24.103005 systemd[1]: Starting flatcar-tmpfiles.service... May 8 00:44:24.103016 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:44:24.103026 systemd[1]: Starting kmod-static-nodes.service... May 8 00:44:24.103037 systemd[1]: Starting modprobe@configfs.service... May 8 00:44:24.103048 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:44:24.103060 systemd[1]: Starting modprobe@drm.service... May 8 00:44:24.103071 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:44:24.103081 systemd[1]: Starting modprobe@fuse.service... May 8 00:44:24.103092 systemd[1]: Starting modprobe@loop.service... May 8 00:44:24.103102 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 8 00:44:24.103112 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 8 00:44:24.103132 systemd[1]: Stopped systemd-fsck-root.service. May 8 00:44:24.103143 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 8 00:44:24.103153 kernel: loop: module loaded May 8 00:44:24.103165 systemd[1]: Stopped systemd-fsck-usr.service. May 8 00:44:24.103175 systemd[1]: Stopped systemd-journald.service. May 8 00:44:24.103186 systemd[1]: Starting systemd-journald.service... May 8 00:44:24.103197 kernel: fuse: init (API version 7.34) May 8 00:44:24.103207 systemd[1]: Starting systemd-modules-load.service... May 8 00:44:24.103217 systemd[1]: Starting systemd-network-generator.service... May 8 00:44:24.103228 systemd[1]: Starting systemd-remount-fs.service... May 8 00:44:24.103238 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:44:24.103253 systemd[1]: verity-setup.service: Deactivated successfully. May 8 00:44:24.103263 systemd[1]: Stopped verity-setup.service. May 8 00:44:24.103276 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:44:24.103286 systemd[1]: Mounted dev-hugepages.mount. May 8 00:44:24.103300 systemd-journald[1004]: Journal started May 8 00:44:24.103341 systemd-journald[1004]: Runtime Journal (/run/log/journal/dde782d8554d451a8087d4fb5c1b8eff) is 6.0M, max 48.5M, 42.5M free. May 8 00:44:20.642000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 8 00:44:20.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:44:20.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:44:20.888000 audit: BPF prog-id=10 op=LOAD May 8 00:44:20.888000 audit: BPF prog-id=10 op=UNLOAD May 8 00:44:20.888000 audit: BPF prog-id=11 op=LOAD May 8 00:44:20.888000 audit: BPF prog-id=11 op=UNLOAD May 8 00:44:20.920000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 8 00:44:20.920000 audit[927]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d4 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:20.920000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:44:20.923000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 8 00:44:20.923000 audit[927]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:20.923000 audit: CWD cwd="/" May 8 00:44:20.923000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:20.923000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:20.923000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:44:23.964000 audit: BPF prog-id=12 op=LOAD May 8 00:44:23.964000 audit: BPF prog-id=3 op=UNLOAD May 8 00:44:23.964000 audit: BPF prog-id=13 op=LOAD May 8 00:44:23.964000 audit: BPF prog-id=14 op=LOAD May 8 00:44:23.964000 audit: BPF prog-id=4 op=UNLOAD May 8 00:44:23.964000 audit: BPF prog-id=5 op=UNLOAD May 8 00:44:23.965000 audit: BPF prog-id=15 op=LOAD May 8 00:44:23.965000 audit: BPF prog-id=12 op=UNLOAD May 8 00:44:23.965000 audit: BPF prog-id=16 op=LOAD May 8 00:44:23.965000 audit: BPF prog-id=17 op=LOAD May 8 00:44:23.965000 audit: BPF prog-id=13 op=UNLOAD May 8 00:44:23.965000 audit: BPF prog-id=14 op=UNLOAD May 8 00:44:23.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:23.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:23.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:23.978000 audit: BPF prog-id=15 op=UNLOAD May 8 00:44:24.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.079000 audit: BPF prog-id=18 op=LOAD May 8 00:44:24.079000 audit: BPF prog-id=19 op=LOAD May 8 00:44:24.079000 audit: BPF prog-id=20 op=LOAD May 8 00:44:24.079000 audit: BPF prog-id=16 op=UNLOAD May 8 00:44:24.079000 audit: BPF prog-id=17 op=UNLOAD May 8 00:44:24.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.100000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 8 00:44:24.100000 audit[1004]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff547e1800 a2=4000 a3=7fff547e189c items=0 ppid=1 pid=1004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:24.100000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 8 00:44:23.963468 systemd[1]: Queued start job for default target multi-user.target. May 8 00:44:20.919935 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:44:23.963479 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 8 00:44:20.920182 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:44:23.966937 systemd[1]: systemd-journald.service: Deactivated successfully. May 8 00:44:20.920242 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:44:20.920272 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 8 00:44:20.920282 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=debug msg="skipped missing lower profile" missing profile=oem May 8 00:44:20.920312 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 8 00:44:20.920324 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 8 00:44:20.920523 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 8 00:44:20.920555 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:44:20.920566 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:44:20.921244 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 8 00:44:20.921279 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 8 00:44:20.921296 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 8 00:44:20.921309 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 8 00:44:20.921325 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 8 00:44:20.921337 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 8 00:44:24.105935 systemd[1]: Started systemd-journald.service. May 8 00:44:23.653926 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:23Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:44:23.654303 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:23Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:44:23.654456 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:23Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:44:24.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:23.654736 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:23Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:44:23.654811 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:23Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 8 00:44:23.654947 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-08T00:44:23Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 8 00:44:24.106625 systemd[1]: Mounted dev-mqueue.mount. May 8 00:44:24.107469 systemd[1]: Mounted media.mount. May 8 00:44:24.108231 systemd[1]: Mounted sys-kernel-debug.mount. May 8 00:44:24.109248 systemd[1]: Mounted sys-kernel-tracing.mount. May 8 00:44:24.110192 systemd[1]: Mounted tmp.mount. May 8 00:44:24.111155 systemd[1]: Finished kmod-static-nodes.service. May 8 00:44:24.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.112205 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 8 00:44:24.112340 systemd[1]: Finished modprobe@configfs.service. May 8 00:44:24.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.113382 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:44:24.113518 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:44:24.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.114542 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:44:24.114690 systemd[1]: Finished modprobe@drm.service. May 8 00:44:24.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.115676 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:44:24.115797 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:44:24.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.117025 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 8 00:44:24.117177 systemd[1]: Finished modprobe@fuse.service. May 8 00:44:24.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.118276 systemd[1]: Finished flatcar-tmpfiles.service. May 8 00:44:24.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.119296 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:44:24.119414 systemd[1]: Finished modprobe@loop.service. May 8 00:44:24.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.120476 systemd[1]: Finished systemd-modules-load.service. May 8 00:44:24.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.121582 systemd[1]: Finished systemd-network-generator.service. May 8 00:44:24.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.122779 systemd[1]: Finished systemd-remount-fs.service. May 8 00:44:24.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.124166 systemd[1]: Reached target network-pre.target. May 8 00:44:24.126180 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 8 00:44:24.128186 systemd[1]: Mounting sys-kernel-config.mount... May 8 00:44:24.148359 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 8 00:44:24.150164 systemd[1]: Starting systemd-hwdb-update.service... May 8 00:44:24.152340 systemd[1]: Starting systemd-journal-flush.service... May 8 00:44:24.153419 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:44:24.154557 systemd[1]: Starting systemd-random-seed.service... May 8 00:44:24.155548 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:44:24.156885 systemd[1]: Starting systemd-sysctl.service... May 8 00:44:24.158579 systemd-journald[1004]: Time spent on flushing to /var/log/journal/dde782d8554d451a8087d4fb5c1b8eff is 14.423ms for 1106 entries. May 8 00:44:24.158579 systemd-journald[1004]: System Journal (/var/log/journal/dde782d8554d451a8087d4fb5c1b8eff) is 8.0M, max 195.6M, 187.6M free. May 8 00:44:24.200044 systemd-journald[1004]: Received client request to flush runtime journal. May 8 00:44:24.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.159297 systemd[1]: Starting systemd-sysusers.service... May 8 00:44:24.162760 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 8 00:44:24.201389 udevadm[1030]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 8 00:44:24.163842 systemd[1]: Mounted sys-kernel-config.mount. May 8 00:44:24.168402 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:44:24.170776 systemd[1]: Starting systemd-udev-settle.service... May 8 00:44:24.173220 systemd[1]: Finished systemd-random-seed.service. May 8 00:44:24.174405 systemd[1]: Reached target first-boot-complete.target. May 8 00:44:24.184994 systemd[1]: Finished systemd-sysctl.service. May 8 00:44:24.190286 systemd[1]: Finished systemd-sysusers.service. May 8 00:44:24.201028 systemd[1]: Finished systemd-journal-flush.service. May 8 00:44:24.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.804617 systemd[1]: Finished systemd-hwdb-update.service. May 8 00:44:24.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.805000 audit: BPF prog-id=21 op=LOAD May 8 00:44:24.805000 audit: BPF prog-id=22 op=LOAD May 8 00:44:24.805000 audit: BPF prog-id=7 op=UNLOAD May 8 00:44:24.805000 audit: BPF prog-id=8 op=UNLOAD May 8 00:44:24.807479 systemd[1]: Starting systemd-udevd.service... May 8 00:44:24.826261 systemd-udevd[1034]: Using default interface naming scheme 'v252'. May 8 00:44:24.841453 systemd[1]: Started systemd-udevd.service. May 8 00:44:24.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.842000 audit: BPF prog-id=23 op=LOAD May 8 00:44:24.844312 systemd[1]: Starting systemd-networkd.service... May 8 00:44:24.850000 audit: BPF prog-id=24 op=LOAD May 8 00:44:24.850000 audit: BPF prog-id=25 op=LOAD May 8 00:44:24.850000 audit: BPF prog-id=26 op=LOAD May 8 00:44:24.852511 systemd[1]: Starting systemd-userdbd.service... May 8 00:44:24.875957 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 8 00:44:24.887159 systemd[1]: Started systemd-userdbd.service. May 8 00:44:24.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.903325 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:44:24.927947 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 8 00:44:24.932935 kernel: ACPI: button: Power Button [PWRF] May 8 00:44:24.935100 systemd-networkd[1043]: lo: Link UP May 8 00:44:24.935504 systemd-networkd[1043]: lo: Gained carrier May 8 00:44:24.936195 systemd-networkd[1043]: Enumeration completed May 8 00:44:24.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:24.936434 systemd[1]: Started systemd-networkd.service. May 8 00:44:24.937849 systemd-networkd[1043]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:44:24.941460 systemd-networkd[1043]: eth0: Link UP May 8 00:44:24.941546 systemd-networkd[1043]: eth0: Gained carrier May 8 00:44:24.955110 systemd-networkd[1043]: eth0: DHCPv4 address 10.0.0.60/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:44:24.951000 audit[1059]: AVC avc: denied { confidentiality } for pid=1059 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 8 00:44:24.951000 audit[1059]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5639ebfb2bd0 a1=338ac a2=7fa5fe205bc5 a3=5 items=110 ppid=1034 pid=1059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:24.951000 audit: CWD cwd="/" May 8 00:44:24.951000 audit: PATH item=0 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=1 name=(null) inode=11143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=2 name=(null) inode=11143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=3 name=(null) inode=11144 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=4 name=(null) inode=11143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=5 name=(null) inode=11145 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=6 name=(null) inode=11143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=7 name=(null) inode=11146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=8 name=(null) inode=11146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=9 name=(null) inode=11147 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=10 name=(null) inode=11146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=11 name=(null) inode=11148 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=12 name=(null) inode=11146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=13 name=(null) inode=11149 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=14 name=(null) inode=11146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=15 name=(null) inode=11150 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=16 name=(null) inode=11146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=17 name=(null) inode=11151 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=18 name=(null) inode=11143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=19 name=(null) inode=11152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=20 name=(null) inode=11152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=21 name=(null) inode=11153 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=22 name=(null) inode=11152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=23 name=(null) inode=11154 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=24 name=(null) inode=11152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=25 name=(null) inode=11155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=26 name=(null) inode=11152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=27 name=(null) inode=11156 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=28 name=(null) inode=11152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=29 name=(null) inode=11157 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=30 name=(null) inode=11143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=31 name=(null) inode=11158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=32 name=(null) inode=11158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=33 name=(null) inode=11159 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=34 name=(null) inode=11158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=35 name=(null) inode=11160 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=36 name=(null) inode=11158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=37 name=(null) inode=11161 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=38 name=(null) inode=11158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=39 name=(null) inode=11162 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=40 name=(null) inode=11158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=41 name=(null) inode=11163 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=42 name=(null) inode=11143 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=43 name=(null) inode=11164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=44 name=(null) inode=11164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=45 name=(null) inode=11165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=46 name=(null) inode=11164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=47 name=(null) inode=11166 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=48 name=(null) inode=11164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=49 name=(null) inode=11167 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=50 name=(null) inode=11164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=51 name=(null) inode=11168 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=52 name=(null) inode=11164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=53 name=(null) inode=11169 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=54 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=55 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=56 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=57 name=(null) inode=11171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=58 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=59 name=(null) inode=11172 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=60 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=61 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=62 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=63 name=(null) inode=11174 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=64 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=65 name=(null) inode=11175 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=66 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=67 name=(null) inode=11176 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=68 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=69 name=(null) inode=11177 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=70 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=71 name=(null) inode=11178 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=72 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=73 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=74 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=75 name=(null) inode=11180 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=76 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=77 name=(null) inode=11181 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=78 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=79 name=(null) inode=11182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=80 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=81 name=(null) inode=11183 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=82 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=83 name=(null) inode=11184 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=84 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=85 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=86 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=87 name=(null) inode=11186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=88 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=89 name=(null) inode=11187 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=90 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=91 name=(null) inode=11188 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=92 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=93 name=(null) inode=11189 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=94 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=95 name=(null) inode=11190 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=96 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=97 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=98 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=99 name=(null) inode=11192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=100 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=101 name=(null) inode=11193 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=102 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=103 name=(null) inode=11194 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=104 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=105 name=(null) inode=11195 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=106 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=107 name=(null) inode=11196 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PATH item=109 name=(null) inode=11197 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:44:24.951000 audit: PROCTITLE proctitle="(udev-worker)" May 8 00:44:24.978003 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 8 00:44:24.987938 kernel: mousedev: PS/2 mouse device common for all mice May 8 00:44:25.000934 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 8 00:44:25.001284 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 8 00:44:25.001450 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 8 00:44:25.070116 kernel: kvm: Nested Virtualization enabled May 8 00:44:25.070249 kernel: SVM: kvm: Nested Paging enabled May 8 00:44:25.071049 kernel: SVM: Virtual VMLOAD VMSAVE supported May 8 00:44:25.071193 kernel: SVM: Virtual GIF supported May 8 00:44:25.089952 kernel: EDAC MC: Ver: 3.0.0 May 8 00:44:25.115355 systemd[1]: Finished systemd-udev-settle.service. May 8 00:44:25.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:25.117632 systemd[1]: Starting lvm2-activation-early.service... May 8 00:44:25.126287 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:44:25.155339 systemd[1]: Finished lvm2-activation-early.service. May 8 00:44:25.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:25.156573 systemd[1]: Reached target cryptsetup.target. May 8 00:44:25.158787 systemd[1]: Starting lvm2-activation.service... May 8 00:44:25.165201 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:44:25.200160 systemd[1]: Finished lvm2-activation.service. May 8 00:44:25.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:25.201324 systemd[1]: Reached target local-fs-pre.target. May 8 00:44:25.202338 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 8 00:44:25.202379 systemd[1]: Reached target local-fs.target. May 8 00:44:25.203292 systemd[1]: Reached target machines.target. May 8 00:44:25.205862 systemd[1]: Starting ldconfig.service... May 8 00:44:25.206993 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:44:25.207102 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:44:25.208500 systemd[1]: Starting systemd-boot-update.service... May 8 00:44:25.210868 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 8 00:44:25.214175 systemd[1]: Starting systemd-machine-id-commit.service... May 8 00:44:25.217290 systemd[1]: Starting systemd-sysext.service... May 8 00:44:25.218809 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1072 (bootctl) May 8 00:44:25.220200 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 8 00:44:25.247730 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 8 00:44:25.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:25.250274 kernel: kauditd_printk_skb: 228 callbacks suppressed May 8 00:44:25.250340 kernel: audit: type=1130 audit(1746665065.248:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:25.255164 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:44:25.260240 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:44:25.260440 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:44:25.321948 kernel: loop0: detected capacity change from 0 to 218376 May 8 00:44:26.010949 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 8 00:44:26.088006 systemd-fsck[1080]: fsck.fat 4.2 (2021-01-31) May 8 00:44:26.088006 systemd-fsck[1080]: /dev/vda1: 790 files, 120710/258078 clusters May 8 00:44:26.090442 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 8 00:44:26.093270 systemd[1]: Mounting boot.mount... May 8 00:44:26.095932 kernel: loop1: detected capacity change from 0 to 218376 May 8 00:44:26.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.143068 kernel: audit: type=1130 audit(1746665066.091:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.143529 systemd[1]: Mounted boot.mount. May 8 00:44:26.143616 (sd-sysext)[1084]: Using extensions 'kubernetes'. May 8 00:44:26.144725 (sd-sysext)[1084]: Merged extensions into '/usr'. May 8 00:44:26.192180 systemd[1]: Finished systemd-boot-update.service. May 8 00:44:26.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.193515 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:44:26.200939 kernel: audit: type=1130 audit(1746665066.193:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.229516 systemd[1]: Mounting usr-share-oem.mount... May 8 00:44:26.230586 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:44:26.232505 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:44:26.241616 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:44:26.243753 systemd[1]: Starting modprobe@loop.service... May 8 00:44:26.244583 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:44:26.244687 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:44:26.244803 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:44:26.247355 systemd[1]: Mounted usr-share-oem.mount. May 8 00:44:26.248443 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:44:26.248570 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:44:26.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.249751 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:44:26.249869 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:44:26.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.252926 kernel: audit: type=1130 audit(1746665066.248:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.252960 kernel: audit: type=1131 audit(1746665066.248:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.257215 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:44:26.257323 systemd[1]: Finished modprobe@loop.service. May 8 00:44:26.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.265053 kernel: audit: type=1130 audit(1746665066.256:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.265103 kernel: audit: type=1131 audit(1746665066.256:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.266413 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:44:26.266676 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:44:26.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.270216 systemd[1]: Finished systemd-sysext.service. May 8 00:44:26.273381 kernel: audit: type=1130 audit(1746665066.265:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.273447 kernel: audit: type=1131 audit(1746665066.265:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.275830 systemd[1]: Starting ensure-sysext.service... May 8 00:44:26.279951 kernel: audit: type=1130 audit(1746665066.273:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.281484 systemd[1]: Starting systemd-tmpfiles-setup.service... May 8 00:44:26.288161 systemd[1]: Reloading. May 8 00:44:26.333712 ldconfig[1071]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 8 00:44:26.335100 systemd-networkd[1043]: eth0: Gained IPv6LL May 8 00:44:26.336371 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 8 00:44:26.341373 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 8 00:44:26.346250 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 8 00:44:26.428590 /usr/lib/systemd/system-generators/torcx-generator[1112]: time="2025-05-08T00:44:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:44:26.428625 /usr/lib/systemd/system-generators/torcx-generator[1112]: time="2025-05-08T00:44:26Z" level=info msg="torcx already run" May 8 00:44:26.511573 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:44:26.511615 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:44:26.537378 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:44:26.594979 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 8 00:44:26.596000 audit: BPF prog-id=27 op=LOAD May 8 00:44:26.597000 audit: BPF prog-id=28 op=LOAD May 8 00:44:26.597000 audit: BPF prog-id=21 op=UNLOAD May 8 00:44:26.597000 audit: BPF prog-id=22 op=UNLOAD May 8 00:44:26.597000 audit: BPF prog-id=29 op=LOAD May 8 00:44:26.597000 audit: BPF prog-id=24 op=UNLOAD May 8 00:44:26.597000 audit: BPF prog-id=30 op=LOAD May 8 00:44:26.597000 audit: BPF prog-id=31 op=LOAD May 8 00:44:26.597000 audit: BPF prog-id=25 op=UNLOAD May 8 00:44:26.597000 audit: BPF prog-id=26 op=UNLOAD May 8 00:44:26.598000 audit: BPF prog-id=32 op=LOAD May 8 00:44:26.598000 audit: BPF prog-id=18 op=UNLOAD May 8 00:44:26.599000 audit: BPF prog-id=33 op=LOAD May 8 00:44:26.599000 audit: BPF prog-id=34 op=LOAD May 8 00:44:26.599000 audit: BPF prog-id=19 op=UNLOAD May 8 00:44:26.599000 audit: BPF prog-id=20 op=UNLOAD May 8 00:44:26.600000 audit: BPF prog-id=35 op=LOAD May 8 00:44:26.600000 audit: BPF prog-id=23 op=UNLOAD May 8 00:44:26.604782 systemd[1]: Finished ldconfig.service. May 8 00:44:26.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.605983 systemd[1]: Finished systemd-machine-id-commit.service. May 8 00:44:26.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.608079 systemd[1]: Finished systemd-tmpfiles-setup.service. May 8 00:44:26.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.611669 systemd[1]: Starting audit-rules.service... May 8 00:44:26.613832 systemd[1]: Starting clean-ca-certificates.service... May 8 00:44:26.616000 audit: BPF prog-id=36 op=LOAD May 8 00:44:26.615844 systemd[1]: Starting systemd-journal-catalog-update.service... May 8 00:44:26.618507 systemd[1]: Starting systemd-resolved.service... May 8 00:44:26.619000 audit: BPF prog-id=37 op=LOAD May 8 00:44:26.620890 systemd[1]: Starting systemd-timesyncd.service... May 8 00:44:26.622876 systemd[1]: Starting systemd-update-utmp.service... May 8 00:44:26.624997 systemd[1]: Finished clean-ca-certificates.service. May 8 00:44:26.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.626000 audit[1162]: SYSTEM_BOOT pid=1162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 8 00:44:26.630038 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:44:26.633567 systemd[1]: Finished systemd-update-utmp.service. May 8 00:44:26.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.635106 systemd[1]: Finished systemd-journal-catalog-update.service. May 8 00:44:26.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.638798 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:44:26.639122 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:44:26.640600 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:44:26.642822 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:44:26.645681 systemd[1]: Starting modprobe@loop.service... May 8 00:44:26.649406 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:44:26.649603 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:44:26.651429 systemd[1]: Starting systemd-update-done.service... May 8 00:44:26.652422 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:44:26.652519 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:44:26.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.653512 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:44:26.653629 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:44:26.655420 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:44:26.655586 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:44:26.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.659333 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:44:26.659465 systemd[1]: Finished modprobe@loop.service. May 8 00:44:26.663060 augenrules[1177]: No rules May 8 00:44:26.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.662000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 8 00:44:26.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:26.662000 audit[1177]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff76680910 a2=420 a3=0 items=0 ppid=1154 pid=1177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:26.662000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 8 00:44:26.663288 systemd[1]: Finished systemd-update-done.service. May 8 00:44:26.664712 systemd[1]: Finished audit-rules.service. May 8 00:44:26.667190 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:44:26.667425 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:44:26.669218 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:44:26.671507 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:44:26.673891 systemd[1]: Starting modprobe@loop.service... May 8 00:44:26.674870 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:44:26.675067 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:44:26.675171 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:44:26.675256 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:44:26.676230 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:44:26.676348 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:44:26.677674 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:44:26.677781 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:44:26.682005 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:44:26.682109 systemd[1]: Finished modprobe@loop.service. May 8 00:44:26.682810 systemd-resolved[1158]: Positive Trust Anchors: May 8 00:44:26.682824 systemd-resolved[1158]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:44:26.682857 systemd-resolved[1158]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:44:26.685445 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:44:26.685640 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:44:26.687090 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:44:26.688755 systemd-timesyncd[1161]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 8 00:44:26.688806 systemd-timesyncd[1161]: Initial clock synchronization to Thu 2025-05-08 00:44:26.988275 UTC. May 8 00:44:26.691170 systemd[1]: Starting modprobe@drm.service... May 8 00:44:26.709052 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:44:26.711066 systemd-resolved[1158]: Defaulting to hostname 'linux'. May 8 00:44:26.711228 systemd[1]: Starting modprobe@loop.service... May 8 00:44:26.712125 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:44:26.712225 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:44:26.713537 systemd[1]: Starting systemd-networkd-wait-online.service... May 8 00:44:26.714702 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:44:26.714812 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:44:26.715671 systemd[1]: Started systemd-timesyncd.service. May 8 00:44:26.717156 systemd[1]: Started systemd-resolved.service. May 8 00:44:26.718440 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:44:26.718553 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:44:26.719810 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:44:26.719944 systemd[1]: Finished modprobe@drm.service. May 8 00:44:26.721165 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:44:26.721270 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:44:26.722593 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:44:26.722694 systemd[1]: Finished modprobe@loop.service. May 8 00:44:26.723915 systemd[1]: Finished systemd-networkd-wait-online.service. May 8 00:44:26.725530 systemd[1]: Reached target network.target. May 8 00:44:26.726521 systemd[1]: Reached target network-online.target. May 8 00:44:26.727499 systemd[1]: Reached target nss-lookup.target. May 8 00:44:26.728479 systemd[1]: Reached target time-set.target. May 8 00:44:26.729393 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:44:26.729415 systemd[1]: Reached target sysinit.target. May 8 00:44:26.730486 systemd[1]: Started motdgen.path. May 8 00:44:26.731310 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 8 00:44:26.732719 systemd[1]: Started logrotate.timer. May 8 00:44:26.733627 systemd[1]: Started mdadm.timer. May 8 00:44:26.734416 systemd[1]: Started systemd-tmpfiles-clean.timer. May 8 00:44:26.735381 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:44:26.735411 systemd[1]: Reached target paths.target. May 8 00:44:26.736275 systemd[1]: Reached target timers.target. May 8 00:44:26.737395 systemd[1]: Listening on dbus.socket. May 8 00:44:26.739160 systemd[1]: Starting docker.socket... May 8 00:44:26.742208 systemd[1]: Listening on sshd.socket. May 8 00:44:26.743183 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:44:26.743228 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:44:26.743741 systemd[1]: Finished ensure-sysext.service. May 8 00:44:26.744753 systemd[1]: Listening on docker.socket. May 8 00:44:26.746345 systemd[1]: Reached target sockets.target. May 8 00:44:26.747163 systemd[1]: Reached target basic.target. May 8 00:44:26.747978 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:44:26.748002 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:44:26.749023 systemd[1]: Starting containerd.service... May 8 00:44:26.751332 systemd[1]: Starting dbus.service... May 8 00:44:26.753104 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:44:26.755171 systemd[1]: Starting extend-filesystems.service... May 8 00:44:26.756288 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 8 00:44:26.759477 jq[1196]: false May 8 00:44:26.757465 systemd[1]: Starting kubelet.service... May 8 00:44:26.759292 systemd[1]: Starting motdgen.service... May 8 00:44:26.761339 systemd[1]: Starting prepare-helm.service... May 8 00:44:26.763348 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:44:26.765465 systemd[1]: Starting sshd-keygen.service... May 8 00:44:26.769103 dbus-daemon[1195]: [system] SELinux support is enabled May 8 00:44:26.768958 systemd[1]: Starting systemd-logind.service... May 8 00:44:26.769780 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:44:26.769875 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:44:26.770334 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 8 00:44:26.771494 extend-filesystems[1197]: Found loop1 May 8 00:44:26.771494 extend-filesystems[1197]: Found sr0 May 8 00:44:26.774854 extend-filesystems[1197]: Found vda May 8 00:44:26.774854 extend-filesystems[1197]: Found vda1 May 8 00:44:26.774854 extend-filesystems[1197]: Found vda2 May 8 00:44:26.774854 extend-filesystems[1197]: Found vda3 May 8 00:44:26.774854 extend-filesystems[1197]: Found usr May 8 00:44:26.774854 extend-filesystems[1197]: Found vda4 May 8 00:44:26.774854 extend-filesystems[1197]: Found vda6 May 8 00:44:26.774854 extend-filesystems[1197]: Found vda7 May 8 00:44:26.774854 extend-filesystems[1197]: Found vda9 May 8 00:44:26.774854 extend-filesystems[1197]: Checking size of /dev/vda9 May 8 00:44:26.819998 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 8 00:44:26.772672 systemd[1]: Starting update-engine.service... May 8 00:44:26.820187 update_engine[1211]: I0508 00:44:26.809940 1211 main.cc:92] Flatcar Update Engine starting May 8 00:44:26.820187 update_engine[1211]: I0508 00:44:26.812615 1211 update_check_scheduler.cc:74] Next update check in 11m2s May 8 00:44:26.820449 extend-filesystems[1197]: Resized partition /dev/vda9 May 8 00:44:26.777820 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 8 00:44:26.833520 jq[1215]: true May 8 00:44:26.833785 extend-filesystems[1220]: resize2fs 1.46.5 (30-Dec-2021) May 8 00:44:26.821649 systemd[1]: Started dbus.service. May 8 00:44:26.838854 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:44:26.839063 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:44:26.840742 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:44:26.840899 systemd[1]: Finished motdgen.service. May 8 00:44:26.843316 systemd-logind[1208]: Watching system buttons on /dev/input/event1 (Power Button) May 8 00:44:26.843338 systemd-logind[1208]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 8 00:44:26.844604 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:44:26.844891 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:44:26.845029 systemd-logind[1208]: New seat seat0. May 8 00:44:26.858121 jq[1226]: true May 8 00:44:26.859429 systemd[1]: Started systemd-logind.service. May 8 00:44:26.860207 tar[1225]: linux-amd64/LICENSE May 8 00:44:26.860683 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 8 00:44:26.860702 systemd[1]: Reached target system-config.target. May 8 00:44:26.861664 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 8 00:44:26.861679 systemd[1]: Reached target user-config.target. May 8 00:44:26.862575 systemd[1]: Started update-engine.service. May 8 00:44:26.863116 tar[1225]: linux-amd64/helm May 8 00:44:26.864994 systemd[1]: Started locksmithd.service. May 8 00:44:26.865438 dbus-daemon[1195]: [system] Successfully activated service 'org.freedesktop.systemd1' May 8 00:44:26.870941 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 8 00:44:27.084711 extend-filesystems[1220]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 8 00:44:27.084711 extend-filesystems[1220]: old_desc_blocks = 1, new_desc_blocks = 1 May 8 00:44:27.084711 extend-filesystems[1220]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 8 00:44:27.089361 extend-filesystems[1197]: Resized filesystem in /dev/vda9 May 8 00:44:27.087438 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:44:27.087649 systemd[1]: Finished extend-filesystems.service. May 8 00:44:27.097710 bash[1249]: Updated "/home/core/.ssh/authorized_keys" May 8 00:44:27.097644 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 8 00:44:27.105453 env[1227]: time="2025-05-08T00:44:27.104104136Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 8 00:44:27.136065 locksmithd[1236]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 8 00:44:27.141875 env[1227]: time="2025-05-08T00:44:27.141812736Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 8 00:44:27.142217 env[1227]: time="2025-05-08T00:44:27.142170299Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 8 00:44:27.144515 env[1227]: time="2025-05-08T00:44:27.144483709Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.180-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 8 00:44:27.144612 env[1227]: time="2025-05-08T00:44:27.144591463Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 8 00:44:27.144970 env[1227]: time="2025-05-08T00:44:27.144924590Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:44:27.145057 env[1227]: time="2025-05-08T00:44:27.145037968Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 8 00:44:27.145141 env[1227]: time="2025-05-08T00:44:27.145119560Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 8 00:44:27.145229 env[1227]: time="2025-05-08T00:44:27.145208294Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 8 00:44:27.145392 env[1227]: time="2025-05-08T00:44:27.145369151Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 8 00:44:27.145763 env[1227]: time="2025-05-08T00:44:27.145742649Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 8 00:44:27.146061 env[1227]: time="2025-05-08T00:44:27.146031892Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:44:27.146160 env[1227]: time="2025-05-08T00:44:27.146135135Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 8 00:44:27.146312 env[1227]: time="2025-05-08T00:44:27.146287241Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 8 00:44:27.146428 env[1227]: time="2025-05-08T00:44:27.146403861Z" level=info msg="metadata content store policy set" policy=shared May 8 00:44:27.152915 env[1227]: time="2025-05-08T00:44:27.152889562Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 8 00:44:27.153043 env[1227]: time="2025-05-08T00:44:27.153022594Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 8 00:44:27.153134 env[1227]: time="2025-05-08T00:44:27.153114081Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 8 00:44:27.153267 env[1227]: time="2025-05-08T00:44:27.153238737Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 8 00:44:27.153393 env[1227]: time="2025-05-08T00:44:27.153375834Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 8 00:44:27.153485 env[1227]: time="2025-05-08T00:44:27.153464088Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 8 00:44:27.153570 env[1227]: time="2025-05-08T00:44:27.153550431Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 8 00:44:27.153654 env[1227]: time="2025-05-08T00:44:27.153634508Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 8 00:44:27.153746 env[1227]: time="2025-05-08T00:44:27.153725746Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 8 00:44:27.153838 env[1227]: time="2025-05-08T00:44:27.153817442Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 8 00:44:27.153929 env[1227]: time="2025-05-08T00:44:27.153908670Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 8 00:44:27.154039 env[1227]: time="2025-05-08T00:44:27.154019242Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 8 00:44:27.154213 env[1227]: time="2025-05-08T00:44:27.154193091Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 8 00:44:27.154409 env[1227]: time="2025-05-08T00:44:27.154388758Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 8 00:44:27.154782 env[1227]: time="2025-05-08T00:44:27.154762151Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 8 00:44:27.154893 env[1227]: time="2025-05-08T00:44:27.154873066Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 8 00:44:27.154997 env[1227]: time="2025-05-08T00:44:27.154976996Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 8 00:44:27.155132 env[1227]: time="2025-05-08T00:44:27.155114155Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 8 00:44:27.155271 env[1227]: time="2025-05-08T00:44:27.155252654Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 8 00:44:27.155375 env[1227]: time="2025-05-08T00:44:27.155354619Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 8 00:44:27.155459 env[1227]: time="2025-05-08T00:44:27.155439517Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 8 00:44:27.155543 env[1227]: time="2025-05-08T00:44:27.155523470Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 8 00:44:27.155646 env[1227]: time="2025-05-08T00:44:27.155625362Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 8 00:44:27.155744 env[1227]: time="2025-05-08T00:44:27.155720258Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 8 00:44:27.155837 env[1227]: time="2025-05-08T00:44:27.155818201Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 8 00:44:27.155956 env[1227]: time="2025-05-08T00:44:27.155914303Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 8 00:44:27.156183 env[1227]: time="2025-05-08T00:44:27.156158407Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 8 00:44:27.156318 env[1227]: time="2025-05-08T00:44:27.156272802Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 8 00:44:27.156435 env[1227]: time="2025-05-08T00:44:27.156413444Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 8 00:44:27.156519 env[1227]: time="2025-05-08T00:44:27.156499308Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 8 00:44:27.156634 env[1227]: time="2025-05-08T00:44:27.156609006Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 8 00:44:27.156717 env[1227]: time="2025-05-08T00:44:27.156696991Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 8 00:44:27.156849 env[1227]: time="2025-05-08T00:44:27.156822738Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 8 00:44:27.157049 env[1227]: time="2025-05-08T00:44:27.157025265Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 8 00:44:27.157575 env[1227]: time="2025-05-08T00:44:27.157487454Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 8 00:44:27.158777 env[1227]: time="2025-05-08T00:44:27.157768050Z" level=info msg="Connect containerd service" May 8 00:44:27.158777 env[1227]: time="2025-05-08T00:44:27.157814438Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 8 00:44:27.159612 env[1227]: time="2025-05-08T00:44:27.159579669Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:44:27.159941 env[1227]: time="2025-05-08T00:44:27.159871522Z" level=info msg="Start subscribing containerd event" May 8 00:44:27.160058 env[1227]: time="2025-05-08T00:44:27.160040444Z" level=info msg="Start recovering state" May 8 00:44:27.160305 env[1227]: time="2025-05-08T00:44:27.160269351Z" level=info msg="Start event monitor" May 8 00:44:27.160456 env[1227]: time="2025-05-08T00:44:27.160418952Z" level=info msg="Start snapshots syncer" May 8 00:44:27.160651 env[1227]: time="2025-05-08T00:44:27.160614494Z" level=info msg="Start cni network conf syncer for default" May 8 00:44:27.160839 env[1227]: time="2025-05-08T00:44:27.160796492Z" level=info msg="Start streaming server" May 8 00:44:27.161539 env[1227]: time="2025-05-08T00:44:27.161521909Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 8 00:44:27.161775 env[1227]: time="2025-05-08T00:44:27.161757780Z" level=info msg=serving... address=/run/containerd/containerd.sock May 8 00:44:27.169294 systemd[1]: Started containerd.service. May 8 00:44:27.171540 env[1227]: time="2025-05-08T00:44:27.168877055Z" level=info msg="containerd successfully booted in 0.277150s" May 8 00:44:27.736461 sshd_keygen[1221]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 8 00:44:27.761653 systemd[1]: Finished sshd-keygen.service. May 8 00:44:27.764557 systemd[1]: Starting issuegen.service... May 8 00:44:27.801684 tar[1225]: linux-amd64/README.md May 8 00:44:27.808728 systemd[1]: Finished prepare-helm.service. May 8 00:44:27.813569 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:44:27.813790 systemd[1]: Finished issuegen.service. May 8 00:44:27.816592 systemd[1]: Starting systemd-user-sessions.service... May 8 00:44:27.823047 systemd[1]: Finished systemd-user-sessions.service. May 8 00:44:27.825843 systemd[1]: Started getty@tty1.service. May 8 00:44:27.828322 systemd[1]: Started serial-getty@ttyS0.service. May 8 00:44:27.830367 systemd[1]: Reached target getty.target. May 8 00:44:28.179183 systemd[1]: Created slice system-sshd.slice. May 8 00:44:28.181651 systemd[1]: Started sshd@0-10.0.0.60:22-10.0.0.1:49892.service. May 8 00:44:28.286553 sshd[1277]: Accepted publickey for core from 10.0.0.1 port 49892 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:44:28.288894 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:44:28.300737 systemd-logind[1208]: New session 1 of user core. May 8 00:44:28.301829 systemd[1]: Created slice user-500.slice. May 8 00:44:28.304425 systemd[1]: Starting user-runtime-dir@500.service... May 8 00:44:28.317554 systemd[1]: Finished user-runtime-dir@500.service. May 8 00:44:28.320706 systemd[1]: Starting user@500.service... May 8 00:44:28.325210 (systemd)[1280]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 8 00:44:28.475819 systemd[1280]: Queued start job for default target default.target. May 8 00:44:28.476342 systemd[1280]: Reached target paths.target. May 8 00:44:28.476358 systemd[1280]: Reached target sockets.target. May 8 00:44:28.476370 systemd[1280]: Reached target timers.target. May 8 00:44:28.476381 systemd[1280]: Reached target basic.target. May 8 00:44:28.476491 systemd[1]: Started user@500.service. May 8 00:44:28.477099 systemd[1280]: Reached target default.target. May 8 00:44:28.477174 systemd[1280]: Startup finished in 143ms. May 8 00:44:28.478511 systemd[1]: Started session-1.scope. May 8 00:44:28.534166 systemd[1]: Started sshd@1-10.0.0.60:22-10.0.0.1:49904.service. May 8 00:44:28.578299 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 49904 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:44:28.580160 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:44:28.584346 systemd-logind[1208]: New session 2 of user core. May 8 00:44:28.585208 systemd[1]: Started session-2.scope. May 8 00:44:28.662538 systemd[1]: Started kubelet.service. May 8 00:44:28.664123 systemd[1]: Reached target multi-user.target. May 8 00:44:28.667201 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:44:28.671805 sshd[1289]: pam_unix(sshd:session): session closed for user core May 8 00:44:28.676718 systemd[1]: Started sshd@2-10.0.0.60:22-10.0.0.1:49910.service. May 8 00:44:28.678474 systemd[1]: sshd@1-10.0.0.60:22-10.0.0.1:49904.service: Deactivated successfully. May 8 00:44:28.679193 systemd[1]: session-2.scope: Deactivated successfully. May 8 00:44:28.680006 systemd-logind[1208]: Session 2 logged out. Waiting for processes to exit. May 8 00:44:28.681736 systemd-logind[1208]: Removed session 2. May 8 00:44:28.682355 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:44:28.682503 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:44:28.683692 systemd[1]: Startup finished in 1.071s (kernel) + 5.562s (initrd) + 8.125s (userspace) = 14.759s. May 8 00:44:28.716189 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 49910 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:44:28.718368 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:44:28.722207 systemd-logind[1208]: New session 3 of user core. May 8 00:44:28.723342 systemd[1]: Started session-3.scope. May 8 00:44:28.792223 sshd[1298]: pam_unix(sshd:session): session closed for user core May 8 00:44:28.832824 systemd[1]: sshd@2-10.0.0.60:22-10.0.0.1:49910.service: Deactivated successfully. May 8 00:44:28.833712 systemd[1]: session-3.scope: Deactivated successfully. May 8 00:44:28.834368 systemd-logind[1208]: Session 3 logged out. Waiting for processes to exit. May 8 00:44:28.835274 systemd-logind[1208]: Removed session 3. May 8 00:44:29.425352 kubelet[1294]: E0508 00:44:29.425263 1294 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:44:29.427188 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:44:29.427315 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:44:29.427629 systemd[1]: kubelet.service: Consumed 2.100s CPU time. May 8 00:44:38.969535 systemd[1]: Started sshd@3-10.0.0.60:22-10.0.0.1:49768.service. May 8 00:44:39.009687 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 49768 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:44:39.011050 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:44:39.014909 systemd-logind[1208]: New session 4 of user core. May 8 00:44:39.015699 systemd[1]: Started session-4.scope. May 8 00:44:39.069283 sshd[1311]: pam_unix(sshd:session): session closed for user core May 8 00:44:39.072082 systemd[1]: sshd@3-10.0.0.60:22-10.0.0.1:49768.service: Deactivated successfully. May 8 00:44:39.072608 systemd[1]: session-4.scope: Deactivated successfully. May 8 00:44:39.073072 systemd-logind[1208]: Session 4 logged out. Waiting for processes to exit. May 8 00:44:39.074098 systemd[1]: Started sshd@4-10.0.0.60:22-10.0.0.1:49774.service. May 8 00:44:39.074745 systemd-logind[1208]: Removed session 4. May 8 00:44:39.110869 sshd[1317]: Accepted publickey for core from 10.0.0.1 port 49774 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:44:39.112067 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:44:39.115311 systemd-logind[1208]: New session 5 of user core. May 8 00:44:39.116085 systemd[1]: Started session-5.scope. May 8 00:44:39.166541 sshd[1317]: pam_unix(sshd:session): session closed for user core May 8 00:44:39.170029 systemd[1]: sshd@4-10.0.0.60:22-10.0.0.1:49774.service: Deactivated successfully. May 8 00:44:39.170760 systemd[1]: session-5.scope: Deactivated successfully. May 8 00:44:39.171424 systemd-logind[1208]: Session 5 logged out. Waiting for processes to exit. May 8 00:44:39.172982 systemd[1]: Started sshd@5-10.0.0.60:22-10.0.0.1:49786.service. May 8 00:44:39.173785 systemd-logind[1208]: Removed session 5. May 8 00:44:39.210297 sshd[1323]: Accepted publickey for core from 10.0.0.1 port 49786 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:44:39.211420 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:44:39.214753 systemd-logind[1208]: New session 6 of user core. May 8 00:44:39.215585 systemd[1]: Started session-6.scope. May 8 00:44:39.270670 sshd[1323]: pam_unix(sshd:session): session closed for user core May 8 00:44:39.273354 systemd[1]: sshd@5-10.0.0.60:22-10.0.0.1:49786.service: Deactivated successfully. May 8 00:44:39.273927 systemd[1]: session-6.scope: Deactivated successfully. May 8 00:44:39.274441 systemd-logind[1208]: Session 6 logged out. Waiting for processes to exit. May 8 00:44:39.275565 systemd[1]: Started sshd@6-10.0.0.60:22-10.0.0.1:49790.service. May 8 00:44:39.276416 systemd-logind[1208]: Removed session 6. May 8 00:44:39.312740 sshd[1329]: Accepted publickey for core from 10.0.0.1 port 49790 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:44:39.314068 sshd[1329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:44:39.317698 systemd-logind[1208]: New session 7 of user core. May 8 00:44:39.318495 systemd[1]: Started session-7.scope. May 8 00:44:39.377577 sudo[1333]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 8 00:44:39.377780 sudo[1333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:44:39.388148 dbus-daemon[1195]: \xd0m=\xfc\xf9U: received setenforce notice (enforcing=933939328) May 8 00:44:39.390561 sudo[1333]: pam_unix(sudo:session): session closed for user root May 8 00:44:39.392495 sshd[1329]: pam_unix(sshd:session): session closed for user core May 8 00:44:39.396017 systemd[1]: sshd@6-10.0.0.60:22-10.0.0.1:49790.service: Deactivated successfully. May 8 00:44:39.396703 systemd[1]: session-7.scope: Deactivated successfully. May 8 00:44:39.397341 systemd-logind[1208]: Session 7 logged out. Waiting for processes to exit. May 8 00:44:39.398573 systemd[1]: Started sshd@7-10.0.0.60:22-10.0.0.1:49804.service. May 8 00:44:39.399548 systemd-logind[1208]: Removed session 7. May 8 00:44:39.438292 sshd[1337]: Accepted publickey for core from 10.0.0.1 port 49804 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:44:39.439925 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:44:39.440896 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 8 00:44:39.441206 systemd[1]: Stopped kubelet.service. May 8 00:44:39.441252 systemd[1]: kubelet.service: Consumed 2.100s CPU time. May 8 00:44:39.442896 systemd[1]: Starting kubelet.service... May 8 00:44:39.445185 systemd-logind[1208]: New session 8 of user core. May 8 00:44:39.447290 systemd[1]: Started session-8.scope. May 8 00:44:39.505140 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 8 00:44:39.505455 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:44:39.508903 sudo[1343]: pam_unix(sudo:session): session closed for user root May 8 00:44:39.515200 sudo[1342]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 8 00:44:39.515514 sudo[1342]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:44:39.526749 systemd[1]: Stopping audit-rules.service... May 8 00:44:39.527000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:44:39.529030 auditctl[1346]: No rules May 8 00:44:39.529306 kernel: kauditd_printk_skb: 36 callbacks suppressed May 8 00:44:39.529377 kernel: audit: type=1305 audit(1746665079.527:195): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:44:39.529640 systemd[1]: audit-rules.service: Deactivated successfully. May 8 00:44:39.529839 systemd[1]: Stopped audit-rules.service. May 8 00:44:39.531577 systemd[1]: Starting audit-rules.service... May 8 00:44:39.527000 audit[1346]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc131363a0 a2=420 a3=0 items=0 ppid=1 pid=1346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:39.542945 kernel: audit: type=1300 audit(1746665079.527:195): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc131363a0 a2=420 a3=0 items=0 ppid=1 pid=1346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:39.543038 kernel: audit: type=1327 audit(1746665079.527:195): proctitle=2F7362696E2F617564697463746C002D44 May 8 00:44:39.543058 kernel: audit: type=1131 audit(1746665079.528:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:39.527000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 8 00:44:39.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:39.553628 augenrules[1363]: No rules May 8 00:44:39.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:39.554218 systemd[1]: Finished audit-rules.service. May 8 00:44:39.558710 sudo[1342]: pam_unix(sudo:session): session closed for user root May 8 00:44:39.557000 audit[1342]: USER_END pid=1342 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:44:39.558929 kernel: audit: type=1130 audit(1746665079.553:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:39.558962 kernel: audit: type=1106 audit(1746665079.557:198): pid=1342 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:44:39.560320 sshd[1337]: pam_unix(sshd:session): session closed for user core May 8 00:44:39.557000 audit[1342]: CRED_DISP pid=1342 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:44:39.564382 systemd[1]: sshd@7-10.0.0.60:22-10.0.0.1:49804.service: Deactivated successfully. May 8 00:44:39.565007 systemd[1]: session-8.scope: Deactivated successfully. May 8 00:44:39.565603 systemd-logind[1208]: Session 8 logged out. Waiting for processes to exit. May 8 00:44:39.567939 kernel: audit: type=1104 audit(1746665079.557:199): pid=1342 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:44:39.567980 kernel: audit: type=1106 audit(1746665079.560:200): pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:44:39.560000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:44:39.566844 systemd[1]: Started sshd@8-10.0.0.60:22-10.0.0.1:49816.service. May 8 00:44:39.568429 systemd-logind[1208]: Removed session 8. May 8 00:44:39.575644 kernel: audit: type=1104 audit(1746665079.560:201): pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:44:39.560000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:44:39.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.60:22-10.0.0.1:49804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:39.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.60:22-10.0.0.1:49816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:39.579931 kernel: audit: type=1131 audit(1746665079.563:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.60:22-10.0.0.1:49804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:39.605000 audit[1369]: USER_ACCT pid=1369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:44:39.606201 sshd[1369]: Accepted publickey for core from 10.0.0.1 port 49816 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:44:39.606878 systemd[1]: Started kubelet.service. May 8 00:44:39.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:39.607000 audit[1369]: CRED_ACQ pid=1369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:44:39.607000 audit[1369]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc24cf24d0 a2=3 a3=0 items=0 ppid=1 pid=1369 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:39.607000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:44:39.608613 sshd[1369]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:44:39.612396 systemd-logind[1208]: New session 9 of user core. May 8 00:44:39.613149 systemd[1]: Started session-9.scope. May 8 00:44:39.615000 audit[1369]: USER_START pid=1369 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:44:39.617000 audit[1379]: CRED_ACQ pid=1379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:44:39.660886 kubelet[1373]: E0508 00:44:39.660801 1373 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:44:39.665200 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:44:39.665334 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:44:39.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:44:39.665000 audit[1381]: USER_ACCT pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:44:39.666444 sudo[1381]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 8 00:44:39.665000 audit[1381]: CRED_REFR pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:44:39.666671 sudo[1381]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:44:39.667000 audit[1381]: USER_START pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:44:39.693886 systemd[1]: Starting docker.service... May 8 00:44:39.787872 env[1393]: time="2025-05-08T00:44:39.787704237Z" level=info msg="Starting up" May 8 00:44:39.789531 env[1393]: time="2025-05-08T00:44:39.789481239Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:44:39.789531 env[1393]: time="2025-05-08T00:44:39.789502124Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:44:39.789622 env[1393]: time="2025-05-08T00:44:39.789538515Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:44:39.789622 env[1393]: time="2025-05-08T00:44:39.789550375Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:44:39.791755 env[1393]: time="2025-05-08T00:44:39.791724913Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 8 00:44:39.791755 env[1393]: time="2025-05-08T00:44:39.791744698Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 8 00:44:39.791843 env[1393]: time="2025-05-08T00:44:39.791765159Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 8 00:44:39.791843 env[1393]: time="2025-05-08T00:44:39.791774900Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 8 00:44:40.627827 env[1393]: time="2025-05-08T00:44:40.627764662Z" level=info msg="Loading containers: start." May 8 00:44:40.683000 audit[1427]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.683000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff9dd7cc50 a2=0 a3=7fff9dd7cc3c items=0 ppid=1393 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.683000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 8 00:44:40.685000 audit[1429]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.685000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe0d177630 a2=0 a3=7ffe0d17761c items=0 ppid=1393 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.685000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 8 00:44:40.687000 audit[1431]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.687000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffe0a95e50 a2=0 a3=7fffe0a95e3c items=0 ppid=1393 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.687000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:44:40.689000 audit[1433]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.689000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd2f3d2290 a2=0 a3=7ffd2f3d227c items=0 ppid=1393 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.689000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:44:40.691000 audit[1435]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.691000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd54e95360 a2=0 a3=7ffd54e9534c items=0 ppid=1393 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 8 00:44:40.707000 audit[1440]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.707000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff52687b30 a2=0 a3=7fff52687b1c items=0 ppid=1393 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.707000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 8 00:44:40.718000 audit[1442]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.718000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe23001780 a2=0 a3=7ffe2300176c items=0 ppid=1393 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.718000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 8 00:44:40.720000 audit[1444]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.720000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe80813fb0 a2=0 a3=7ffe80813f9c items=0 ppid=1393 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.720000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 8 00:44:40.722000 audit[1446]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.722000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe1bdae680 a2=0 a3=7ffe1bdae66c items=0 ppid=1393 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.722000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:44:40.734000 audit[1450]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.734000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc401ad000 a2=0 a3=7ffc401acfec items=0 ppid=1393 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.734000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:44:40.740000 audit[1451]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.740000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffedfcb8400 a2=0 a3=7ffedfcb83ec items=0 ppid=1393 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.740000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:44:40.750933 kernel: Initializing XFRM netlink socket May 8 00:44:40.782644 env[1393]: time="2025-05-08T00:44:40.782587625Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 8 00:44:40.801000 audit[1459]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.801000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc8754c9f0 a2=0 a3=7ffc8754c9dc items=0 ppid=1393 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.801000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 8 00:44:40.813000 audit[1462]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.813000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe2626cd10 a2=0 a3=7ffe2626ccfc items=0 ppid=1393 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.813000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 8 00:44:40.817000 audit[1465]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.817000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc19a23310 a2=0 a3=7ffc19a232fc items=0 ppid=1393 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.817000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 8 00:44:40.819000 audit[1467]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.819000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffd0aa2ea0 a2=0 a3=7fffd0aa2e8c items=0 ppid=1393 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.819000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 8 00:44:40.821000 audit[1469]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.821000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffa931f4c0 a2=0 a3=7fffa931f4ac items=0 ppid=1393 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.821000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 8 00:44:40.823000 audit[1471]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.823000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe24fe5f30 a2=0 a3=7ffe24fe5f1c items=0 ppid=1393 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.823000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 8 00:44:40.825000 audit[1473]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.825000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc7c3cde20 a2=0 a3=7ffc7c3cde0c items=0 ppid=1393 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.825000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 8 00:44:40.833000 audit[1476]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.833000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc5c090890 a2=0 a3=7ffc5c09087c items=0 ppid=1393 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.833000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 8 00:44:40.835000 audit[1478]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.835000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff80853e20 a2=0 a3=7fff80853e0c items=0 ppid=1393 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.835000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 8 00:44:40.837000 audit[1480]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.837000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffeb9943500 a2=0 a3=7ffeb99434ec items=0 ppid=1393 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.837000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 8 00:44:40.839000 audit[1482]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.839000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc5920d4f0 a2=0 a3=7ffc5920d4dc items=0 ppid=1393 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.839000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 8 00:44:40.840585 systemd-networkd[1043]: docker0: Link UP May 8 00:44:40.850000 audit[1486]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.850000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2f754fa0 a2=0 a3=7ffd2f754f8c items=0 ppid=1393 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.850000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 8 00:44:40.855000 audit[1487]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:44:40.855000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc74a6dc70 a2=0 a3=7ffc74a6dc5c items=0 ppid=1393 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:44:40.855000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 8 00:44:40.856379 env[1393]: time="2025-05-08T00:44:40.856326696Z" level=info msg="Loading containers: done." May 8 00:44:40.872718 env[1393]: time="2025-05-08T00:44:40.872648143Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 8 00:44:40.873087 env[1393]: time="2025-05-08T00:44:40.872832879Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 8 00:44:40.873087 env[1393]: time="2025-05-08T00:44:40.872955653Z" level=info msg="Daemon has completed initialization" May 8 00:44:40.893131 systemd[1]: Started docker.service. May 8 00:44:40.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:40.900864 env[1393]: time="2025-05-08T00:44:40.900779896Z" level=info msg="API listen on /run/docker.sock" May 8 00:44:41.929638 env[1227]: time="2025-05-08T00:44:41.929515809Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 8 00:44:42.756066 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1978636371.mount: Deactivated successfully. May 8 00:44:45.055689 env[1227]: time="2025-05-08T00:44:45.055617306Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:45.057988 env[1227]: time="2025-05-08T00:44:45.057895510Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:45.060014 env[1227]: time="2025-05-08T00:44:45.059969324Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:45.062486 env[1227]: time="2025-05-08T00:44:45.062439988Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:45.063222 env[1227]: time="2025-05-08T00:44:45.063180280Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 8 00:44:45.063998 env[1227]: time="2025-05-08T00:44:45.063949412Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 8 00:44:47.894118 env[1227]: time="2025-05-08T00:44:47.894042649Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:47.901080 env[1227]: time="2025-05-08T00:44:47.901006268Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:47.904239 env[1227]: time="2025-05-08T00:44:47.904191682Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:47.908244 env[1227]: time="2025-05-08T00:44:47.908178477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:47.908879 env[1227]: time="2025-05-08T00:44:47.908839060Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 8 00:44:47.909440 env[1227]: time="2025-05-08T00:44:47.909396474Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 8 00:44:49.755238 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 8 00:44:49.755490 systemd[1]: Stopped kubelet.service. May 8 00:44:49.757368 systemd[1]: Starting kubelet.service... May 8 00:44:49.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:49.758975 kernel: kauditd_printk_skb: 86 callbacks suppressed May 8 00:44:49.759049 kernel: audit: type=1130 audit(1746665089.754:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:49.767044 kernel: audit: type=1131 audit(1746665089.754:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:49.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:49.866440 systemd[1]: Started kubelet.service. May 8 00:44:49.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:49.871937 kernel: audit: type=1130 audit(1746665089.865:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:44:50.000777 kubelet[1529]: E0508 00:44:50.000702 1529 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:44:50.002860 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:44:50.003033 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:44:50.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:44:50.006936 kernel: audit: type=1131 audit(1746665090.002:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:44:50.900655 env[1227]: time="2025-05-08T00:44:50.900565423Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:50.903351 env[1227]: time="2025-05-08T00:44:50.903292557Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:50.906111 env[1227]: time="2025-05-08T00:44:50.906030560Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:50.908451 env[1227]: time="2025-05-08T00:44:50.908410953Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:50.909310 env[1227]: time="2025-05-08T00:44:50.909277196Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 8 00:44:50.910030 env[1227]: time="2025-05-08T00:44:50.909996992Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 8 00:44:52.255440 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3252478244.mount: Deactivated successfully. May 8 00:44:53.785082 env[1227]: time="2025-05-08T00:44:53.784980210Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:53.798034 env[1227]: time="2025-05-08T00:44:53.797950870Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:53.801575 env[1227]: time="2025-05-08T00:44:53.801530234Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:53.804881 env[1227]: time="2025-05-08T00:44:53.804827533Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:53.805245 env[1227]: time="2025-05-08T00:44:53.805211188Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 8 00:44:53.805805 env[1227]: time="2025-05-08T00:44:53.805767747Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 8 00:44:54.500224 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1445315921.mount: Deactivated successfully. May 8 00:44:57.011801 env[1227]: time="2025-05-08T00:44:57.011713991Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:57.018160 env[1227]: time="2025-05-08T00:44:57.018088733Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:57.020762 env[1227]: time="2025-05-08T00:44:57.020697281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:57.025746 env[1227]: time="2025-05-08T00:44:57.025701099Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:57.027092 env[1227]: time="2025-05-08T00:44:57.027049566Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 8 00:44:57.027770 env[1227]: time="2025-05-08T00:44:57.027715548Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 8 00:44:57.582627 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3110801897.mount: Deactivated successfully. May 8 00:44:57.590554 env[1227]: time="2025-05-08T00:44:57.590503895Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:57.592924 env[1227]: time="2025-05-08T00:44:57.592851906Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:57.594491 env[1227]: time="2025-05-08T00:44:57.594448366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:57.595875 env[1227]: time="2025-05-08T00:44:57.595839651Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:44:57.596381 env[1227]: time="2025-05-08T00:44:57.596339539Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 8 00:44:57.596787 env[1227]: time="2025-05-08T00:44:57.596761227Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 8 00:44:58.145003 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2391685318.mount: Deactivated successfully. May 8 00:45:00.005163 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 8 00:45:00.005354 systemd[1]: Stopped kubelet.service. May 8 00:45:00.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:00.006881 systemd[1]: Starting kubelet.service... May 8 00:45:00.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:00.013463 kernel: audit: type=1130 audit(1746665100.003:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:00.013663 kernel: audit: type=1131 audit(1746665100.003:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:00.161073 systemd[1]: Started kubelet.service. May 8 00:45:00.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:00.165959 kernel: audit: type=1130 audit(1746665100.160:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:00.242690 kubelet[1540]: E0508 00:45:00.242633 1540 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:45:00.244488 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:45:00.244615 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:45:00.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:45:00.247932 kernel: audit: type=1131 audit(1746665100.243:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 8 00:45:01.612348 env[1227]: time="2025-05-08T00:45:01.612240151Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:01.614453 env[1227]: time="2025-05-08T00:45:01.614397784Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:01.617589 env[1227]: time="2025-05-08T00:45:01.617542338Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:01.622132 env[1227]: time="2025-05-08T00:45:01.622048877Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:01.623265 env[1227]: time="2025-05-08T00:45:01.623223401Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 8 00:45:03.879407 systemd[1]: Stopped kubelet.service. May 8 00:45:03.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:03.882433 systemd[1]: Starting kubelet.service... May 8 00:45:03.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:03.886520 kernel: audit: type=1130 audit(1746665103.878:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:03.886680 kernel: audit: type=1131 audit(1746665103.878:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:03.907275 systemd[1]: Reloading. May 8 00:45:04.027878 /usr/lib/systemd/system-generators/torcx-generator[1595]: time="2025-05-08T00:45:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:45:04.027925 /usr/lib/systemd/system-generators/torcx-generator[1595]: time="2025-05-08T00:45:04Z" level=info msg="torcx already run" May 8 00:45:04.241664 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:45:04.241698 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:45:04.260038 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:45:04.347457 kernel: audit: type=1400 audit(1746665104.333:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.347650 kernel: audit: type=1400 audit(1746665104.333:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.347697 kernel: audit: type=1400 audit(1746665104.334:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.353408 kernel: audit: type=1400 audit(1746665104.334:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.342000 audit: BPF prog-id=43 op=LOAD May 8 00:45:04.342000 audit: BPF prog-id=38 op=UNLOAD May 8 00:45:04.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.346000 audit: BPF prog-id=44 op=LOAD May 8 00:45:04.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.346000 audit: BPF prog-id=45 op=LOAD May 8 00:45:04.346000 audit: BPF prog-id=39 op=UNLOAD May 8 00:45:04.346000 audit: BPF prog-id=40 op=UNLOAD May 8 00:45:04.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.351000 audit: BPF prog-id=46 op=LOAD May 8 00:45:04.351000 audit: BPF prog-id=36 op=UNLOAD May 8 00:45:04.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.352000 audit: BPF prog-id=47 op=LOAD May 8 00:45:04.352000 audit: BPF prog-id=37 op=UNLOAD May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit: BPF prog-id=48 op=LOAD May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit: BPF prog-id=49 op=LOAD May 8 00:45:04.354000 audit: BPF prog-id=27 op=UNLOAD May 8 00:45:04.354000 audit: BPF prog-id=28 op=UNLOAD May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit: BPF prog-id=50 op=LOAD May 8 00:45:04.355000 audit: BPF prog-id=29 op=UNLOAD May 8 00:45:04.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit: BPF prog-id=51 op=LOAD May 8 00:45:04.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.355000 audit: BPF prog-id=52 op=LOAD May 8 00:45:04.355000 audit: BPF prog-id=30 op=UNLOAD May 8 00:45:04.355000 audit: BPF prog-id=31 op=UNLOAD May 8 00:45:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit: BPF prog-id=53 op=LOAD May 8 00:45:04.356000 audit: BPF prog-id=32 op=UNLOAD May 8 00:45:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit: BPF prog-id=54 op=LOAD May 8 00:45:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.357000 audit: BPF prog-id=55 op=LOAD May 8 00:45:04.357000 audit: BPF prog-id=33 op=UNLOAD May 8 00:45:04.357000 audit: BPF prog-id=34 op=UNLOAD May 8 00:45:04.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.359000 audit: BPF prog-id=56 op=LOAD May 8 00:45:04.359000 audit: BPF prog-id=35 op=UNLOAD May 8 00:45:04.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:04.360000 audit: BPF prog-id=57 op=LOAD May 8 00:45:04.360000 audit: BPF prog-id=41 op=UNLOAD May 8 00:45:04.371304 systemd[1]: Started kubelet.service. May 8 00:45:04.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:04.372741 systemd[1]: Stopping kubelet.service... May 8 00:45:04.372979 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:45:04.373125 systemd[1]: Stopped kubelet.service. May 8 00:45:04.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:04.374573 systemd[1]: Starting kubelet.service... May 8 00:45:04.491002 systemd[1]: Started kubelet.service. May 8 00:45:04.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:04.540394 kubelet[1643]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:45:04.540394 kubelet[1643]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 8 00:45:04.540394 kubelet[1643]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:45:04.540846 kubelet[1643]: I0508 00:45:04.540470 1643 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:45:05.150576 kubelet[1643]: I0508 00:45:05.150511 1643 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 8 00:45:05.150576 kubelet[1643]: I0508 00:45:05.150554 1643 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:45:05.150889 kubelet[1643]: I0508 00:45:05.150865 1643 server.go:954] "Client rotation is on, will bootstrap in background" May 8 00:45:05.224036 kubelet[1643]: I0508 00:45:05.223975 1643 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:45:05.224644 kubelet[1643]: E0508 00:45:05.224439 1643 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.60:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.60:6443: connect: connection refused" logger="UnhandledError" May 8 00:45:05.236470 kubelet[1643]: E0508 00:45:05.236442 1643 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 8 00:45:05.236470 kubelet[1643]: I0508 00:45:05.236470 1643 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 8 00:45:05.240370 kubelet[1643]: I0508 00:45:05.240344 1643 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:45:05.240601 kubelet[1643]: I0508 00:45:05.240555 1643 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:45:05.240774 kubelet[1643]: I0508 00:45:05.240589 1643 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 8 00:45:05.240931 kubelet[1643]: I0508 00:45:05.240783 1643 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:45:05.240931 kubelet[1643]: I0508 00:45:05.240792 1643 container_manager_linux.go:304] "Creating device plugin manager" May 8 00:45:05.240998 kubelet[1643]: I0508 00:45:05.240972 1643 state_mem.go:36] "Initialized new in-memory state store" May 8 00:45:05.245223 kubelet[1643]: I0508 00:45:05.245169 1643 kubelet.go:446] "Attempting to sync node with API server" May 8 00:45:05.245223 kubelet[1643]: I0508 00:45:05.245200 1643 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:45:05.245321 kubelet[1643]: I0508 00:45:05.245235 1643 kubelet.go:352] "Adding apiserver pod source" May 8 00:45:05.245321 kubelet[1643]: I0508 00:45:05.245255 1643 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:45:05.252697 kubelet[1643]: W0508 00:45:05.252613 1643 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.60:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.60:6443: connect: connection refused May 8 00:45:05.252697 kubelet[1643]: E0508 00:45:05.252696 1643 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.60:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.60:6443: connect: connection refused" logger="UnhandledError" May 8 00:45:05.252697 kubelet[1643]: W0508 00:45:05.252632 1643 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.60:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.60:6443: connect: connection refused May 8 00:45:05.252986 kubelet[1643]: E0508 00:45:05.252732 1643 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.60:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.60:6443: connect: connection refused" logger="UnhandledError" May 8 00:45:05.255953 kubelet[1643]: I0508 00:45:05.255932 1643 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:45:05.256346 kubelet[1643]: I0508 00:45:05.256321 1643 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:45:05.257942 kubelet[1643]: W0508 00:45:05.257899 1643 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 8 00:45:05.269724 kubelet[1643]: I0508 00:45:05.269680 1643 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 8 00:45:05.269724 kubelet[1643]: I0508 00:45:05.269733 1643 server.go:1287] "Started kubelet" May 8 00:45:05.270728 kubelet[1643]: I0508 00:45:05.270650 1643 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:45:05.271134 kubelet[1643]: I0508 00:45:05.271112 1643 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:45:05.271226 kubelet[1643]: I0508 00:45:05.271199 1643 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:45:05.270000 audit[1643]: AVC avc: denied { mac_admin } for pid=1643 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:05.271333 kubelet[1643]: I0508 00:45:05.271265 1643 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:45:05.271333 kubelet[1643]: I0508 00:45:05.271307 1643 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 8 00:45:05.271435 kubelet[1643]: I0508 00:45:05.271417 1643 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:45:05.272388 kernel: kauditd_printk_skb: 171 callbacks suppressed May 8 00:45:05.272456 kernel: audit: type=1400 audit(1746665105.270:424): avc: denied { mac_admin } for pid=1643 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:05.270000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:45:05.276358 kubelet[1643]: I0508 00:45:05.276217 1643 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 8 00:45:05.278399 kernel: audit: type=1401 audit(1746665105.270:424): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:45:05.278445 kernel: audit: type=1300 audit(1746665105.270:424): arch=c000003e syscall=188 success=no exit=-22 a0=c0008999e0 a1=c000a30c18 a2=c0008999b0 a3=25 items=0 ppid=1 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.270000 audit[1643]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008999e0 a1=c000a30c18 a2=c0008999b0 a3=25 items=0 ppid=1 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.279941 kubelet[1643]: E0508 00:45:05.279889 1643 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:45:05.280166 kubelet[1643]: E0508 00:45:05.280097 1643 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:45:05.280888 kubelet[1643]: I0508 00:45:05.280450 1643 volume_manager.go:297] "Starting Kubelet Volume Manager" May 8 00:45:05.280888 kubelet[1643]: E0508 00:45:05.280680 1643 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.60:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.60:6443: connect: connection refused" interval="200ms" May 8 00:45:05.280888 kubelet[1643]: I0508 00:45:05.280828 1643 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:45:05.281087 kubelet[1643]: I0508 00:45:05.281040 1643 reconciler.go:26] "Reconciler: start to sync state" May 8 00:45:05.281538 kubelet[1643]: I0508 00:45:05.281485 1643 factory.go:221] Registration of the systemd container factory successfully May 8 00:45:05.281755 kubelet[1643]: I0508 00:45:05.281723 1643 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:45:05.281837 kubelet[1643]: W0508 00:45:05.281737 1643 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.60:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.60:6443: connect: connection refused May 8 00:45:05.270000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:45:05.287061 kubelet[1643]: I0508 00:45:05.284937 1643 factory.go:221] Registration of the containerd container factory successfully May 8 00:45:05.287061 kubelet[1643]: E0508 00:45:05.281797 1643 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.60:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.60:6443: connect: connection refused" logger="UnhandledError" May 8 00:45:05.287061 kubelet[1643]: E0508 00:45:05.281678 1643 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.60:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.60:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183d66a8b52bafc9 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-08 00:45:05.269698505 +0000 UTC m=+0.774403082,LastTimestamp:2025-05-08 00:45:05.269698505 +0000 UTC m=+0.774403082,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 8 00:45:05.287687 kubelet[1643]: I0508 00:45:05.287654 1643 server.go:490] "Adding debug handlers to kubelet server" May 8 00:45:05.289717 kernel: audit: type=1327 audit(1746665105.270:424): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:45:05.289769 kernel: audit: type=1400 audit(1746665105.270:425): avc: denied { mac_admin } for pid=1643 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:05.270000 audit[1643]: AVC avc: denied { mac_admin } for pid=1643 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:05.293975 kernel: audit: type=1401 audit(1746665105.270:425): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:45:05.270000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:45:05.270000 audit[1643]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb8380 a1=c000a30c30 a2=c000899a70 a3=25 items=0 ppid=1 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.299878 kernel: audit: type=1300 audit(1746665105.270:425): arch=c000003e syscall=188 success=no exit=-22 a0=c000bb8380 a1=c000a30c30 a2=c000899a70 a3=25 items=0 ppid=1 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.270000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:45:05.303040 kubelet[1643]: I0508 00:45:05.301340 1643 cpu_manager.go:221] "Starting CPU manager" policy="none" May 8 00:45:05.303040 kubelet[1643]: I0508 00:45:05.301363 1643 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 8 00:45:05.303040 kubelet[1643]: I0508 00:45:05.301390 1643 state_mem.go:36] "Initialized new in-memory state store" May 8 00:45:05.293000 audit[1657]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:05.307243 kernel: audit: type=1327 audit(1746665105.270:425): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:45:05.307322 kernel: audit: type=1325 audit(1746665105.293:426): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:05.307343 kernel: audit: type=1300 audit(1746665105.293:426): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff83976c00 a2=0 a3=7fff83976bec items=0 ppid=1643 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.293000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff83976c00 a2=0 a3=7fff83976bec items=0 ppid=1643 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:45:05.299000 audit[1659]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:05.299000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1707b2c0 a2=0 a3=7ffc1707b2ac items=0 ppid=1643 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:45:05.301000 audit[1663]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:05.301000 audit[1663]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd2a898f0 a2=0 a3=7fffd2a898dc items=0 ppid=1643 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:45:05.304000 audit[1665]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:05.304000 audit[1665]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdd9011cb0 a2=0 a3=7ffdd9011c9c items=0 ppid=1643 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:45:05.380684 kubelet[1643]: E0508 00:45:05.380614 1643 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:45:05.481411 kubelet[1643]: E0508 00:45:05.481166 1643 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:45:05.482030 kubelet[1643]: E0508 00:45:05.481772 1643 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.60:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.60:6443: connect: connection refused" interval="400ms" May 8 00:45:05.574782 kubelet[1643]: I0508 00:45:05.574721 1643 policy_none.go:49] "None policy: Start" May 8 00:45:05.574782 kubelet[1643]: I0508 00:45:05.574786 1643 memory_manager.go:186] "Starting memorymanager" policy="None" May 8 00:45:05.575299 kubelet[1643]: I0508 00:45:05.574815 1643 state_mem.go:35] "Initializing new in-memory state store" May 8 00:45:05.579000 audit[1669]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:05.579000 audit[1669]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc2a472010 a2=0 a3=7ffc2a471ffc items=0 ppid=1643 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 8 00:45:05.580461 kubelet[1643]: I0508 00:45:05.580315 1643 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:45:05.581391 kubelet[1643]: E0508 00:45:05.581360 1643 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 8 00:45:05.580000 audit[1671]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:05.580000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd4a59bd40 a2=0 a3=7ffd4a59bd2c items=0 ppid=1643 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:45:05.581784 kubelet[1643]: I0508 00:45:05.581738 1643 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:45:05.581784 kubelet[1643]: I0508 00:45:05.581784 1643 status_manager.go:227] "Starting to sync pod status with apiserver" May 8 00:45:05.582034 kubelet[1643]: I0508 00:45:05.581826 1643 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 8 00:45:05.582034 kubelet[1643]: I0508 00:45:05.581839 1643 kubelet.go:2388] "Starting kubelet main sync loop" May 8 00:45:05.582034 kubelet[1643]: E0508 00:45:05.581991 1643 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:45:05.581000 audit[1672]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:05.581000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd71dcbd70 a2=0 a3=7ffd71dcbd5c items=0 ppid=1643 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:45:05.581000 audit[1673]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:05.581000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffddbcb78a0 a2=0 a3=7ffddbcb788c items=0 ppid=1643 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.582946 kubelet[1643]: W0508 00:45:05.582880 1643 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.60:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.60:6443: connect: connection refused May 8 00:45:05.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:45:05.583063 kubelet[1643]: E0508 00:45:05.582977 1643 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.60:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.60:6443: connect: connection refused" logger="UnhandledError" May 8 00:45:05.582000 audit[1674]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:05.582000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc7824900 a2=0 a3=7ffcc78248ec items=0 ppid=1643 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:45:05.583000 audit[1676]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:05.583000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed692a1e0 a2=0 a3=7ffed692a1cc items=0 ppid=1643 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:45:05.583000 audit[1675]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:05.583000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff90af33c0 a2=0 a3=7fff90af33ac items=0 ppid=1643 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:45:05.584000 audit[1677]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1677 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:05.584000 audit[1677]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe2a711710 a2=0 a3=7ffe2a7116fc items=0 ppid=1643 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:45:05.589954 systemd[1]: Created slice kubepods.slice. May 8 00:45:05.595807 systemd[1]: Created slice kubepods-burstable.slice. May 8 00:45:05.598566 systemd[1]: Created slice kubepods-besteffort.slice. May 8 00:45:05.605206 kubelet[1643]: I0508 00:45:05.605162 1643 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:45:05.604000 audit[1643]: AVC avc: denied { mac_admin } for pid=1643 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:05.604000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:45:05.604000 audit[1643]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a4c390 a1=c000e542b8 a2=c000a4c360 a3=25 items=0 ppid=1 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:05.604000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:45:05.605585 kubelet[1643]: I0508 00:45:05.605271 1643 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:45:05.605585 kubelet[1643]: I0508 00:45:05.605520 1643 eviction_manager.go:189] "Eviction manager: starting control loop" May 8 00:45:05.605585 kubelet[1643]: I0508 00:45:05.605549 1643 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:45:05.605956 kubelet[1643]: I0508 00:45:05.605939 1643 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:45:05.606983 kubelet[1643]: E0508 00:45:05.606957 1643 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 8 00:45:05.607058 kubelet[1643]: E0508 00:45:05.607020 1643 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 8 00:45:05.694919 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 8 00:45:05.702634 kubelet[1643]: E0508 00:45:05.702571 1643 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:45:05.704276 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 8 00:45:05.707202 kubelet[1643]: I0508 00:45:05.707159 1643 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:45:05.707665 kubelet[1643]: E0508 00:45:05.707626 1643 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.60:6443/api/v1/nodes\": dial tcp 10.0.0.60:6443: connect: connection refused" node="localhost" May 8 00:45:05.710859 kubelet[1643]: E0508 00:45:05.710817 1643 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:45:05.713584 systemd[1]: Created slice kubepods-burstable-pod454f5995f3548c4a55353f35cacc947e.slice. May 8 00:45:05.715172 kubelet[1643]: E0508 00:45:05.715128 1643 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:45:05.784443 kubelet[1643]: I0508 00:45:05.784363 1643 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:45:05.784611 kubelet[1643]: I0508 00:45:05.784435 1643 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/454f5995f3548c4a55353f35cacc947e-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"454f5995f3548c4a55353f35cacc947e\") " pod="kube-system/kube-apiserver-localhost" May 8 00:45:05.784611 kubelet[1643]: I0508 00:45:05.784530 1643 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/454f5995f3548c4a55353f35cacc947e-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"454f5995f3548c4a55353f35cacc947e\") " pod="kube-system/kube-apiserver-localhost" May 8 00:45:05.784611 kubelet[1643]: I0508 00:45:05.784549 1643 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:45:05.784611 kubelet[1643]: I0508 00:45:05.784577 1643 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:45:05.784611 kubelet[1643]: I0508 00:45:05.784590 1643 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:45:05.784835 kubelet[1643]: I0508 00:45:05.784638 1643 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:45:05.784835 kubelet[1643]: I0508 00:45:05.784693 1643 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 8 00:45:05.784835 kubelet[1643]: I0508 00:45:05.784748 1643 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/454f5995f3548c4a55353f35cacc947e-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"454f5995f3548c4a55353f35cacc947e\") " pod="kube-system/kube-apiserver-localhost" May 8 00:45:05.883354 kubelet[1643]: E0508 00:45:05.883285 1643 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.60:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.60:6443: connect: connection refused" interval="800ms" May 8 00:45:05.909847 kubelet[1643]: I0508 00:45:05.909794 1643 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:45:05.910362 kubelet[1643]: E0508 00:45:05.910311 1643 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.60:6443/api/v1/nodes\": dial tcp 10.0.0.60:6443: connect: connection refused" node="localhost" May 8 00:45:06.004493 kubelet[1643]: E0508 00:45:06.004407 1643 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:06.005476 env[1227]: time="2025-05-08T00:45:06.005421992Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 8 00:45:06.011792 kubelet[1643]: E0508 00:45:06.011724 1643 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:06.012576 env[1227]: time="2025-05-08T00:45:06.012377965Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 8 00:45:06.015885 kubelet[1643]: E0508 00:45:06.015838 1643 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:06.016553 env[1227]: time="2025-05-08T00:45:06.016504741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:454f5995f3548c4a55353f35cacc947e,Namespace:kube-system,Attempt:0,}" May 8 00:45:06.103151 kubelet[1643]: W0508 00:45:06.102967 1643 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.60:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.60:6443: connect: connection refused May 8 00:45:06.103151 kubelet[1643]: E0508 00:45:06.103067 1643 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.60:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.60:6443: connect: connection refused" logger="UnhandledError" May 8 00:45:06.311826 kubelet[1643]: I0508 00:45:06.311781 1643 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:45:06.312244 kubelet[1643]: E0508 00:45:06.312200 1643 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.60:6443/api/v1/nodes\": dial tcp 10.0.0.60:6443: connect: connection refused" node="localhost" May 8 00:45:06.454258 kubelet[1643]: W0508 00:45:06.453996 1643 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.60:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.60:6443: connect: connection refused May 8 00:45:06.454258 kubelet[1643]: E0508 00:45:06.454137 1643 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.60:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.60:6443: connect: connection refused" logger="UnhandledError" May 8 00:45:06.680103 kubelet[1643]: W0508 00:45:06.680042 1643 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.60:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.60:6443: connect: connection refused May 8 00:45:06.680103 kubelet[1643]: E0508 00:45:06.680092 1643 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.60:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.60:6443: connect: connection refused" logger="UnhandledError" May 8 00:45:06.684645 kubelet[1643]: E0508 00:45:06.684587 1643 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.60:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.60:6443: connect: connection refused" interval="1.6s" May 8 00:45:06.875152 kubelet[1643]: W0508 00:45:06.875091 1643 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.60:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.60:6443: connect: connection refused May 8 00:45:06.875350 kubelet[1643]: E0508 00:45:06.875152 1643 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.60:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.60:6443: connect: connection refused" logger="UnhandledError" May 8 00:45:07.114384 kubelet[1643]: I0508 00:45:07.114331 1643 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:45:07.114712 kubelet[1643]: E0508 00:45:07.114677 1643 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.0.0.60:6443/api/v1/nodes\": dial tcp 10.0.0.60:6443: connect: connection refused" node="localhost" May 8 00:45:07.234208 kubelet[1643]: E0508 00:45:07.234036 1643 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.60:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.60:6443: connect: connection refused" logger="UnhandledError" May 8 00:45:07.619179 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2832980638.mount: Deactivated successfully. May 8 00:45:07.793174 env[1227]: time="2025-05-08T00:45:07.793098968Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.803847 env[1227]: time="2025-05-08T00:45:07.803393729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.806214 env[1227]: time="2025-05-08T00:45:07.806140440Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.816556 env[1227]: time="2025-05-08T00:45:07.816479876Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.819803 env[1227]: time="2025-05-08T00:45:07.819746794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.821109 env[1227]: time="2025-05-08T00:45:07.821025146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.822218 env[1227]: time="2025-05-08T00:45:07.822171110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.824171 env[1227]: time="2025-05-08T00:45:07.824077433Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.825947 env[1227]: time="2025-05-08T00:45:07.825919726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.828643 env[1227]: time="2025-05-08T00:45:07.828575473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.830318 env[1227]: time="2025-05-08T00:45:07.830269709Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.835753 env[1227]: time="2025-05-08T00:45:07.835688034Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:07.888345 env[1227]: time="2025-05-08T00:45:07.888196552Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:45:07.888657 env[1227]: time="2025-05-08T00:45:07.888244535Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:45:07.888657 env[1227]: time="2025-05-08T00:45:07.888493558Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:45:07.888898 env[1227]: time="2025-05-08T00:45:07.888826838Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6c5b6347a00311118c968f65e6e59853ec626ad9af9dd83d3823574057af86fb pid=1690 runtime=io.containerd.runc.v2 May 8 00:45:07.896510 env[1227]: time="2025-05-08T00:45:07.895887587Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:45:07.896510 env[1227]: time="2025-05-08T00:45:07.895951377Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:45:07.896510 env[1227]: time="2025-05-08T00:45:07.895965460Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:45:07.896510 env[1227]: time="2025-05-08T00:45:07.896131318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5bf7004e2e417ffd2fef766a1da358e1f23f618f7d997236c14befeb80be7e44 pid=1699 runtime=io.containerd.runc.v2 May 8 00:45:07.899845 env[1227]: time="2025-05-08T00:45:07.899760845Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:45:07.900006 env[1227]: time="2025-05-08T00:45:07.899829456Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:45:07.900006 env[1227]: time="2025-05-08T00:45:07.899917051Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:45:07.900150 env[1227]: time="2025-05-08T00:45:07.900093394Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6030275133e557691e67d35c2aac3fc1315ba0ff1ebe877352ab9125a27a0cd1 pid=1711 runtime=io.containerd.runc.v2 May 8 00:45:07.960649 systemd[1]: Started cri-containerd-6c5b6347a00311118c968f65e6e59853ec626ad9af9dd83d3823574057af86fb.scope. May 8 00:45:07.971009 systemd[1]: Started cri-containerd-5bf7004e2e417ffd2fef766a1da358e1f23f618f7d997236c14befeb80be7e44.scope. May 8 00:45:07.975734 systemd[1]: Started cri-containerd-6030275133e557691e67d35c2aac3fc1315ba0ff1ebe877352ab9125a27a0cd1.scope. May 8 00:45:08.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.104000 audit: BPF prog-id=58 op=LOAD May 8 00:45:08.105000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1690 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356236333437613030333131313138633936386636356536653539 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1690 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356236333437613030333131313138633936386636356536653539 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit: BPF prog-id=59 op=LOAD May 8 00:45:08.105000 audit[1712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00019e770 items=0 ppid=1690 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356236333437613030333131313138633936386636356536653539 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.105000 audit: BPF prog-id=60 op=LOAD May 8 00:45:08.105000 audit[1712]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00019e7b8 items=0 ppid=1690 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356236333437613030333131313138633936386636356536653539 May 8 00:45:08.105000 audit: BPF prog-id=60 op=UNLOAD May 8 00:45:08.106000 audit: BPF prog-id=59 op=UNLOAD May 8 00:45:08.106000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.106000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.106000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.106000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.106000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.106000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.106000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.106000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.106000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.106000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.106000 audit: BPF prog-id=61 op=LOAD May 8 00:45:08.106000 audit[1712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00019ebc8 items=0 ppid=1690 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663356236333437613030333131313138633936386636356536653539 May 8 00:45:08.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.108000 audit: BPF prog-id=62 op=LOAD May 8 00:45:08.111000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.111000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1699 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663730303465326534313766666432666566373636613164613335 May 8 00:45:08.112000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.112000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1699 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663730303465326534313766666432666566373636613164613335 May 8 00:45:08.112000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.112000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.112000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.112000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.112000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.112000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.112000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.112000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.112000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.112000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.112000 audit: BPF prog-id=63 op=LOAD May 8 00:45:08.112000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000293c70 items=0 ppid=1699 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663730303465326534313766666432666566373636613164613335 May 8 00:45:08.113000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.113000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.113000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.113000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.113000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.113000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.113000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.113000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.113000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.113000 audit: BPF prog-id=64 op=LOAD May 8 00:45:08.113000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000293cb8 items=0 ppid=1699 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663730303465326534313766666432666566373636613164613335 May 8 00:45:08.114000 audit: BPF prog-id=64 op=UNLOAD May 8 00:45:08.114000 audit: BPF prog-id=63 op=UNLOAD May 8 00:45:08.114000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.114000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.114000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.114000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.114000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.114000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.114000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.114000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.114000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.114000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.114000 audit: BPF prog-id=65 op=LOAD May 8 00:45:08.114000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00040c0c8 items=0 ppid=1699 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663730303465326534313766666432666566373636613164613335 May 8 00:45:08.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.128000 audit: BPF prog-id=66 op=LOAD May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1711 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630333032373531333365353537363931653637643335633261616333 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1711 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630333032373531333365353537363931653637643335633261616333 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit: BPF prog-id=67 op=LOAD May 8 00:45:08.132000 audit[1732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00027f630 items=0 ppid=1711 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630333032373531333365353537363931653637643335633261616333 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit: BPF prog-id=68 op=LOAD May 8 00:45:08.132000 audit[1732]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00027f678 items=0 ppid=1711 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630333032373531333365353537363931653637643335633261616333 May 8 00:45:08.132000 audit: BPF prog-id=68 op=UNLOAD May 8 00:45:08.132000 audit: BPF prog-id=67 op=UNLOAD May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { perfmon } for pid=1732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit[1732]: AVC avc: denied { bpf } for pid=1732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.132000 audit: BPF prog-id=69 op=LOAD May 8 00:45:08.132000 audit[1732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00027fa88 items=0 ppid=1711 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630333032373531333365353537363931653637643335633261616333 May 8 00:45:08.145710 env[1227]: time="2025-05-08T00:45:08.145542590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:454f5995f3548c4a55353f35cacc947e,Namespace:kube-system,Attempt:0,} returns sandbox id \"6c5b6347a00311118c968f65e6e59853ec626ad9af9dd83d3823574057af86fb\"" May 8 00:45:08.151608 kubelet[1643]: E0508 00:45:08.151560 1643 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:08.154899 env[1227]: time="2025-05-08T00:45:08.154853113Z" level=info msg="CreateContainer within sandbox \"6c5b6347a00311118c968f65e6e59853ec626ad9af9dd83d3823574057af86fb\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 8 00:45:08.228949 env[1227]: time="2025-05-08T00:45:08.228858388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"5bf7004e2e417ffd2fef766a1da358e1f23f618f7d997236c14befeb80be7e44\"" May 8 00:45:08.229575 kubelet[1643]: E0508 00:45:08.229551 1643 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:08.231659 env[1227]: time="2025-05-08T00:45:08.231621391Z" level=info msg="CreateContainer within sandbox \"5bf7004e2e417ffd2fef766a1da358e1f23f618f7d997236c14befeb80be7e44\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 8 00:45:08.237689 env[1227]: time="2025-05-08T00:45:08.237648486Z" level=info msg="CreateContainer within sandbox \"6c5b6347a00311118c968f65e6e59853ec626ad9af9dd83d3823574057af86fb\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b6e8b8cc9cac33922bebdb9d1ad3234dc000da9d50556643483dd1e045f08e36\"" May 8 00:45:08.238207 env[1227]: time="2025-05-08T00:45:08.238155951Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"6030275133e557691e67d35c2aac3fc1315ba0ff1ebe877352ab9125a27a0cd1\"" May 8 00:45:08.238858 env[1227]: time="2025-05-08T00:45:08.238818998Z" level=info msg="StartContainer for \"b6e8b8cc9cac33922bebdb9d1ad3234dc000da9d50556643483dd1e045f08e36\"" May 8 00:45:08.240383 kubelet[1643]: E0508 00:45:08.240347 1643 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:08.243661 env[1227]: time="2025-05-08T00:45:08.243628492Z" level=info msg="CreateContainer within sandbox \"6030275133e557691e67d35c2aac3fc1315ba0ff1ebe877352ab9125a27a0cd1\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 8 00:45:08.253068 env[1227]: time="2025-05-08T00:45:08.253037954Z" level=info msg="CreateContainer within sandbox \"5bf7004e2e417ffd2fef766a1da358e1f23f618f7d997236c14befeb80be7e44\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"4e11fa655f33e235f3d1ab2ad0dedb3c6ba68608379c646c2f1202c8fbf37987\"" May 8 00:45:08.253453 env[1227]: time="2025-05-08T00:45:08.253424861Z" level=info msg="StartContainer for \"4e11fa655f33e235f3d1ab2ad0dedb3c6ba68608379c646c2f1202c8fbf37987\"" May 8 00:45:08.258864 systemd[1]: Started cri-containerd-b6e8b8cc9cac33922bebdb9d1ad3234dc000da9d50556643483dd1e045f08e36.scope. May 8 00:45:08.264495 env[1227]: time="2025-05-08T00:45:08.264448062Z" level=info msg="CreateContainer within sandbox \"6030275133e557691e67d35c2aac3fc1315ba0ff1ebe877352ab9125a27a0cd1\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"514de14638d8bf067b538dc4fde12b84ff95dfbddfd95660a9e921462fbf57f5\"" May 8 00:45:08.264874 env[1227]: time="2025-05-08T00:45:08.264846034Z" level=info msg="StartContainer for \"514de14638d8bf067b538dc4fde12b84ff95dfbddfd95660a9e921462fbf57f5\"" May 8 00:45:08.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.276000 audit: BPF prog-id=70 op=LOAD May 8 00:45:08.277000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=1690 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236653862386363396361633333393232626562646239643161643332 May 8 00:45:08.277000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=1690 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236653862386363396361633333393232626562646239643161643332 May 8 00:45:08.277000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.277000 audit: BPF prog-id=71 op=LOAD May 8 00:45:08.277000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c00028d210 items=0 ppid=1690 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236653862386363396361633333393232626562646239643161643332 May 8 00:45:08.278000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.278000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.278000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.278000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.278000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.278000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.278000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.278000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.281676 systemd[1]: Started cri-containerd-4e11fa655f33e235f3d1ab2ad0dedb3c6ba68608379c646c2f1202c8fbf37987.scope. May 8 00:45:08.278000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.278000 audit: BPF prog-id=72 op=LOAD May 8 00:45:08.278000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c00028d258 items=0 ppid=1690 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236653862386363396361633333393232626562646239643161643332 May 8 00:45:08.282000 audit: BPF prog-id=72 op=UNLOAD May 8 00:45:08.282000 audit: BPF prog-id=71 op=UNLOAD May 8 00:45:08.282000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.282000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.282000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.282000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.282000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.282000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.282000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.282000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.282000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.282000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.282000 audit: BPF prog-id=73 op=LOAD May 8 00:45:08.282000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00028d668 items=0 ppid=1690 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236653862386363396361633333393232626562646239643161643332 May 8 00:45:08.285472 kubelet[1643]: E0508 00:45:08.285430 1643 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.60:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.60:6443: connect: connection refused" interval="3.2s" May 8 00:45:08.294417 systemd[1]: Started cri-containerd-514de14638d8bf067b538dc4fde12b84ff95dfbddfd95660a9e921462fbf57f5.scope. May 8 00:45:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.298000 audit: BPF prog-id=74 op=LOAD May 8 00:45:08.299000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.299000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1699 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465313166613635356633336532333566336431616232616430646564 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1699 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465313166613635356633336532333566336431616232616430646564 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit: BPF prog-id=75 op=LOAD May 8 00:45:08.300000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d9d10 items=0 ppid=1699 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465313166613635356633336532333566336431616232616430646564 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit: BPF prog-id=76 op=LOAD May 8 00:45:08.300000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d9d58 items=0 ppid=1699 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465313166613635356633336532333566336431616232616430646564 May 8 00:45:08.300000 audit: BPF prog-id=76 op=UNLOAD May 8 00:45:08.300000 audit: BPF prog-id=75 op=UNLOAD May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.300000 audit: BPF prog-id=77 op=LOAD May 8 00:45:08.300000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d4168 items=0 ppid=1699 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465313166613635356633336532333566336431616232616430646564 May 8 00:45:08.336553 kubelet[1643]: W0508 00:45:08.336454 1643 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.60:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.60:6443: connect: connection refused May 8 00:45:08.336752 kubelet[1643]: E0508 00:45:08.336560 1643 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.60:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.60:6443: connect: connection refused" logger="UnhandledError" May 8 00:45:08.347791 env[1227]: time="2025-05-08T00:45:08.347725271Z" level=info msg="StartContainer for \"b6e8b8cc9cac33922bebdb9d1ad3234dc000da9d50556643483dd1e045f08e36\" returns successfully" May 8 00:45:08.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.350000 audit: BPF prog-id=78 op=LOAD May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1711 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346465313436333864386266303637623533386463346664653132 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1711 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346465313436333864386266303637623533386463346664653132 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit: BPF prog-id=79 op=LOAD May 8 00:45:08.351000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024220 items=0 ppid=1711 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346465313436333864386266303637623533386463346664653132 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit: BPF prog-id=80 op=LOAD May 8 00:45:08.351000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024268 items=0 ppid=1711 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346465313436333864386266303637623533386463346664653132 May 8 00:45:08.351000 audit: BPF prog-id=80 op=UNLOAD May 8 00:45:08.351000 audit: BPF prog-id=79 op=UNLOAD May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:08.351000 audit: BPF prog-id=81 op=LOAD May 8 00:45:08.351000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024678 items=0 ppid=1711 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:08.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346465313436333864386266303637623533386463346664653132 May 8 00:45:08.363950 env[1227]: time="2025-05-08T00:45:08.363870712Z" level=info msg="StartContainer for \"4e11fa655f33e235f3d1ab2ad0dedb3c6ba68608379c646c2f1202c8fbf37987\" returns successfully" May 8 00:45:08.398890 env[1227]: time="2025-05-08T00:45:08.398662827Z" level=info msg="StartContainer for \"514de14638d8bf067b538dc4fde12b84ff95dfbddfd95660a9e921462fbf57f5\" returns successfully" May 8 00:45:08.591285 kubelet[1643]: E0508 00:45:08.591060 1643 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:45:08.591285 kubelet[1643]: E0508 00:45:08.591185 1643 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:08.592876 kubelet[1643]: E0508 00:45:08.592742 1643 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:45:08.592876 kubelet[1643]: E0508 00:45:08.592821 1643 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:08.594371 kubelet[1643]: E0508 00:45:08.594245 1643 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:45:08.594371 kubelet[1643]: E0508 00:45:08.594317 1643 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:08.717722 kubelet[1643]: I0508 00:45:08.716872 1643 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:45:09.515000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:09.515000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0006546c0 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:45:09.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:45:09.516000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:09.516000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0001122c0 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:45:09.516000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:45:09.597150 kubelet[1643]: E0508 00:45:09.597093 1643 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:45:09.597653 kubelet[1643]: E0508 00:45:09.597167 1643 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 8 00:45:09.597653 kubelet[1643]: E0508 00:45:09.597292 1643 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:09.597653 kubelet[1643]: E0508 00:45:09.597308 1643 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:09.754000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:09.754000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c005b24000 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:45:09.754000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:45:09.754000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:09.754000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c008bd31e0 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:45:09.754000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:45:09.754000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:09.754000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c005b24090 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:45:09.754000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:45:09.763000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:09.763000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003a3bef0 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:45:09.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:45:09.763000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:09.763000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c005c1bfa0 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:45:09.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:45:09.763000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:09.763000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c006029230 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:45:09.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:45:09.891177 kubelet[1643]: I0508 00:45:09.891045 1643 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 8 00:45:09.981085 kubelet[1643]: I0508 00:45:09.981027 1643 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 8 00:45:09.986261 kubelet[1643]: E0508 00:45:09.986227 1643 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 8 00:45:09.986261 kubelet[1643]: I0508 00:45:09.986251 1643 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 8 00:45:09.987706 kubelet[1643]: E0508 00:45:09.987685 1643 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 8 00:45:09.987816 kubelet[1643]: I0508 00:45:09.987710 1643 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 8 00:45:09.989656 kubelet[1643]: E0508 00:45:09.989615 1643 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 8 00:45:10.255022 kubelet[1643]: I0508 00:45:10.254965 1643 apiserver.go:52] "Watching apiserver" May 8 00:45:10.281554 kubelet[1643]: I0508 00:45:10.281516 1643 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:45:11.925508 update_engine[1211]: I0508 00:45:11.925422 1211 update_attempter.cc:509] Updating boot flags... May 8 00:45:11.956321 systemd[1]: Reloading. May 8 00:45:12.052000 /usr/lib/systemd/system-generators/torcx-generator[1957]: time="2025-05-08T00:45:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:45:12.052027 /usr/lib/systemd/system-generators/torcx-generator[1957]: time="2025-05-08T00:45:12Z" level=info msg="torcx already run" May 8 00:45:12.101108 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:45:12.101127 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:45:12.119586 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:45:12.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.221185 kernel: kauditd_printk_skb: 404 callbacks suppressed May 8 00:45:12.221387 kernel: audit: type=1400 audit(1746665112.218:555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.232322 kernel: audit: type=1400 audit(1746665112.218:556): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.232530 kernel: audit: type=1400 audit(1746665112.218:557): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.236458 kernel: audit: type=1400 audit(1746665112.218:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.236582 kernel: audit: type=1400 audit(1746665112.218:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.243164 kernel: audit: type=1400 audit(1746665112.218:560): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.243266 kernel: audit: type=1400 audit(1746665112.218:561): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.250111 kernel: audit: type=1400 audit(1746665112.218:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.250297 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 8 00:45:12.250379 kernel: audit: type=1400 audit(1746665112.218:563): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit: BPF prog-id=82 op=LOAD May 8 00:45:12.223000 audit: BPF prog-id=43 op=UNLOAD May 8 00:45:12.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit: BPF prog-id=83 op=LOAD May 8 00:45:12.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.224000 audit: BPF prog-id=84 op=LOAD May 8 00:45:12.224000 audit: BPF prog-id=44 op=UNLOAD May 8 00:45:12.224000 audit: BPF prog-id=45 op=UNLOAD May 8 00:45:12.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.231000 audit: BPF prog-id=85 op=LOAD May 8 00:45:12.231000 audit: BPF prog-id=58 op=UNLOAD May 8 00:45:12.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.242000 audit: BPF prog-id=86 op=LOAD May 8 00:45:12.242000 audit: BPF prog-id=46 op=UNLOAD May 8 00:45:12.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.245000 audit: BPF prog-id=87 op=LOAD May 8 00:45:12.245000 audit: BPF prog-id=47 op=UNLOAD May 8 00:45:12.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.253000 audit: BPF prog-id=78 op=UNLOAD May 8 00:45:12.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.254000 audit: BPF prog-id=89 op=LOAD May 8 00:45:12.254000 audit: BPF prog-id=70 op=UNLOAD May 8 00:45:12.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.255000 audit: BPF prog-id=90 op=LOAD May 8 00:45:12.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.256000 audit: BPF prog-id=91 op=LOAD May 8 00:45:12.256000 audit: BPF prog-id=48 op=UNLOAD May 8 00:45:12.256000 audit: BPF prog-id=49 op=UNLOAD May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit: BPF prog-id=92 op=LOAD May 8 00:45:12.257000 audit: BPF prog-id=50 op=UNLOAD May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit: BPF prog-id=93 op=LOAD May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.257000 audit: BPF prog-id=94 op=LOAD May 8 00:45:12.257000 audit: BPF prog-id=51 op=UNLOAD May 8 00:45:12.257000 audit: BPF prog-id=52 op=UNLOAD May 8 00:45:12.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit: BPF prog-id=95 op=LOAD May 8 00:45:12.260000 audit: BPF prog-id=53 op=UNLOAD May 8 00:45:12.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit: BPF prog-id=96 op=LOAD May 8 00:45:12.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.260000 audit: BPF prog-id=97 op=LOAD May 8 00:45:12.260000 audit: BPF prog-id=54 op=UNLOAD May 8 00:45:12.260000 audit: BPF prog-id=55 op=UNLOAD May 8 00:45:12.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.262000 audit: BPF prog-id=98 op=LOAD May 8 00:45:12.262000 audit: BPF prog-id=62 op=UNLOAD May 8 00:45:12.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.263000 audit: BPF prog-id=99 op=LOAD May 8 00:45:12.263000 audit: BPF prog-id=74 op=UNLOAD May 8 00:45:12.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.264000 audit: BPF prog-id=100 op=LOAD May 8 00:45:12.264000 audit: BPF prog-id=66 op=UNLOAD May 8 00:45:12.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.267000 audit: BPF prog-id=101 op=LOAD May 8 00:45:12.267000 audit: BPF prog-id=56 op=UNLOAD May 8 00:45:12.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.269000 audit: BPF prog-id=102 op=LOAD May 8 00:45:12.269000 audit: BPF prog-id=57 op=UNLOAD May 8 00:45:12.321366 systemd[1]: Stopping kubelet.service... May 8 00:45:12.345180 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:45:12.345354 systemd[1]: Stopped kubelet.service. May 8 00:45:12.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:12.345404 systemd[1]: kubelet.service: Consumed 1.306s CPU time. May 8 00:45:12.347008 systemd[1]: Starting kubelet.service... May 8 00:45:12.435532 systemd[1]: Started kubelet.service. May 8 00:45:12.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:12.490053 kubelet[1998]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:45:12.490053 kubelet[1998]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 8 00:45:12.490053 kubelet[1998]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:45:12.490053 kubelet[1998]: I0508 00:45:12.487995 1998 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:45:12.498423 kubelet[1998]: I0508 00:45:12.498361 1998 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 8 00:45:12.498423 kubelet[1998]: I0508 00:45:12.498384 1998 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:45:12.498631 kubelet[1998]: I0508 00:45:12.498606 1998 server.go:954] "Client rotation is on, will bootstrap in background" May 8 00:45:12.500477 kubelet[1998]: I0508 00:45:12.500417 1998 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 8 00:45:12.503132 kubelet[1998]: I0508 00:45:12.503090 1998 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:45:12.508354 kubelet[1998]: E0508 00:45:12.508313 1998 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 8 00:45:12.508354 kubelet[1998]: I0508 00:45:12.508343 1998 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 8 00:45:12.512277 kubelet[1998]: I0508 00:45:12.512250 1998 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:45:12.512464 kubelet[1998]: I0508 00:45:12.512431 1998 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:45:12.512658 kubelet[1998]: I0508 00:45:12.512460 1998 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 8 00:45:12.512658 kubelet[1998]: I0508 00:45:12.512652 1998 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:45:12.512658 kubelet[1998]: I0508 00:45:12.512661 1998 container_manager_linux.go:304] "Creating device plugin manager" May 8 00:45:12.512815 kubelet[1998]: I0508 00:45:12.512693 1998 state_mem.go:36] "Initialized new in-memory state store" May 8 00:45:12.512853 kubelet[1998]: I0508 00:45:12.512838 1998 kubelet.go:446] "Attempting to sync node with API server" May 8 00:45:12.513038 kubelet[1998]: I0508 00:45:12.512855 1998 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:45:12.513038 kubelet[1998]: I0508 00:45:12.512879 1998 kubelet.go:352] "Adding apiserver pod source" May 8 00:45:12.513038 kubelet[1998]: I0508 00:45:12.512952 1998 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:45:12.526051 kubelet[1998]: I0508 00:45:12.526023 1998 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:45:12.526749 kubelet[1998]: I0508 00:45:12.526725 1998 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:45:12.527532 kubelet[1998]: I0508 00:45:12.527509 1998 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 8 00:45:12.528657 kubelet[1998]: I0508 00:45:12.527664 1998 server.go:1287] "Started kubelet" May 8 00:45:12.533026 kubelet[1998]: I0508 00:45:12.532948 1998 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:45:12.533557 kubelet[1998]: I0508 00:45:12.533517 1998 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:45:12.537194 kubelet[1998]: I0508 00:45:12.537146 1998 server.go:490] "Adding debug handlers to kubelet server" May 8 00:45:12.536000 audit[1998]: AVC avc: denied { mac_admin } for pid=1998 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.536000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:45:12.536000 audit[1998]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ca0450 a1=c000c20618 a2=c000ca0420 a3=25 items=0 ppid=1 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:12.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:45:12.536000 audit[1998]: AVC avc: denied { mac_admin } for pid=1998 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.536000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:45:12.536000 audit[1998]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cae3e0 a1=c000c20630 a2=c000ca04e0 a3=25 items=0 ppid=1 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:12.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:45:12.538488 kubelet[1998]: I0508 00:45:12.537750 1998 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:45:12.538488 kubelet[1998]: I0508 00:45:12.537853 1998 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 8 00:45:12.538488 kubelet[1998]: I0508 00:45:12.537941 1998 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:45:12.538488 kubelet[1998]: I0508 00:45:12.538156 1998 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:45:12.538681 kubelet[1998]: I0508 00:45:12.538588 1998 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 8 00:45:12.539595 kubelet[1998]: I0508 00:45:12.539565 1998 volume_manager.go:297] "Starting Kubelet Volume Manager" May 8 00:45:12.539707 kubelet[1998]: I0508 00:45:12.539683 1998 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:45:12.539900 kubelet[1998]: I0508 00:45:12.539856 1998 reconciler.go:26] "Reconciler: start to sync state" May 8 00:45:12.542875 kubelet[1998]: I0508 00:45:12.542847 1998 factory.go:221] Registration of the systemd container factory successfully May 8 00:45:12.543262 kubelet[1998]: I0508 00:45:12.542983 1998 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:45:12.545267 kubelet[1998]: I0508 00:45:12.545240 1998 factory.go:221] Registration of the containerd container factory successfully May 8 00:45:12.552349 kubelet[1998]: I0508 00:45:12.552294 1998 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:45:12.553428 kubelet[1998]: I0508 00:45:12.553389 1998 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:45:12.553497 kubelet[1998]: I0508 00:45:12.553431 1998 status_manager.go:227] "Starting to sync pod status with apiserver" May 8 00:45:12.553497 kubelet[1998]: I0508 00:45:12.553472 1998 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 8 00:45:12.553497 kubelet[1998]: I0508 00:45:12.553484 1998 kubelet.go:2388] "Starting kubelet main sync loop" May 8 00:45:12.553633 kubelet[1998]: E0508 00:45:12.553550 1998 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 8 00:45:12.585979 kubelet[1998]: I0508 00:45:12.585886 1998 cpu_manager.go:221] "Starting CPU manager" policy="none" May 8 00:45:12.585979 kubelet[1998]: I0508 00:45:12.585967 1998 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 8 00:45:12.586182 kubelet[1998]: I0508 00:45:12.586000 1998 state_mem.go:36] "Initialized new in-memory state store" May 8 00:45:12.586307 kubelet[1998]: I0508 00:45:12.586287 1998 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 8 00:45:12.586370 kubelet[1998]: I0508 00:45:12.586308 1998 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 8 00:45:12.586370 kubelet[1998]: I0508 00:45:12.586330 1998 policy_none.go:49] "None policy: Start" May 8 00:45:12.586370 kubelet[1998]: I0508 00:45:12.586339 1998 memory_manager.go:186] "Starting memorymanager" policy="None" May 8 00:45:12.586370 kubelet[1998]: I0508 00:45:12.586350 1998 state_mem.go:35] "Initializing new in-memory state store" May 8 00:45:12.586495 kubelet[1998]: I0508 00:45:12.586478 1998 state_mem.go:75] "Updated machine memory state" May 8 00:45:12.590855 kubelet[1998]: I0508 00:45:12.590801 1998 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:45:12.589000 audit[1998]: AVC avc: denied { mac_admin } for pid=1998 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:12.589000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:45:12.589000 audit[1998]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00104ca50 a1=c000e88ca8 a2=c00104ca20 a3=25 items=0 ppid=1 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:12.589000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:45:12.591233 kubelet[1998]: I0508 00:45:12.590934 1998 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:45:12.591233 kubelet[1998]: I0508 00:45:12.591143 1998 eviction_manager.go:189] "Eviction manager: starting control loop" May 8 00:45:12.591233 kubelet[1998]: I0508 00:45:12.591159 1998 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:45:12.591457 kubelet[1998]: I0508 00:45:12.591415 1998 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:45:12.593594 kubelet[1998]: E0508 00:45:12.593325 1998 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 8 00:45:12.654406 kubelet[1998]: I0508 00:45:12.654337 1998 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 8 00:45:12.654406 kubelet[1998]: I0508 00:45:12.654399 1998 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 8 00:45:12.654670 kubelet[1998]: I0508 00:45:12.654548 1998 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 8 00:45:12.699123 kubelet[1998]: I0508 00:45:12.699084 1998 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 8 00:45:12.707176 kubelet[1998]: I0508 00:45:12.707136 1998 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 8 00:45:12.707304 kubelet[1998]: I0508 00:45:12.707260 1998 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 8 00:45:12.841184 kubelet[1998]: I0508 00:45:12.841118 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:45:12.841184 kubelet[1998]: I0508 00:45:12.841166 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/454f5995f3548c4a55353f35cacc947e-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"454f5995f3548c4a55353f35cacc947e\") " pod="kube-system/kube-apiserver-localhost" May 8 00:45:12.841184 kubelet[1998]: I0508 00:45:12.841197 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/454f5995f3548c4a55353f35cacc947e-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"454f5995f3548c4a55353f35cacc947e\") " pod="kube-system/kube-apiserver-localhost" May 8 00:45:12.841484 kubelet[1998]: I0508 00:45:12.841218 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:45:12.841484 kubelet[1998]: I0508 00:45:12.841246 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:45:12.841484 kubelet[1998]: I0508 00:45:12.841289 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/454f5995f3548c4a55353f35cacc947e-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"454f5995f3548c4a55353f35cacc947e\") " pod="kube-system/kube-apiserver-localhost" May 8 00:45:12.841484 kubelet[1998]: I0508 00:45:12.841313 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:45:12.841484 kubelet[1998]: I0508 00:45:12.841332 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 8 00:45:12.841649 kubelet[1998]: I0508 00:45:12.841355 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 8 00:45:12.963184 kubelet[1998]: E0508 00:45:12.963109 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:12.963418 kubelet[1998]: E0508 00:45:12.963204 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:12.963418 kubelet[1998]: E0508 00:45:12.963242 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:13.514005 kubelet[1998]: I0508 00:45:13.513941 1998 apiserver.go:52] "Watching apiserver" May 8 00:45:13.540096 kubelet[1998]: I0508 00:45:13.540051 1998 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:45:13.569688 kubelet[1998]: I0508 00:45:13.569649 1998 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 8 00:45:13.569934 kubelet[1998]: E0508 00:45:13.569885 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:13.570025 kubelet[1998]: I0508 00:45:13.569982 1998 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 8 00:45:13.802236 kubelet[1998]: E0508 00:45:13.802076 1998 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 8 00:45:13.802236 kubelet[1998]: E0508 00:45:13.802196 1998 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 8 00:45:13.802432 kubelet[1998]: E0508 00:45:13.802256 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:13.802498 kubelet[1998]: E0508 00:45:13.802447 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:13.865054 kubelet[1998]: I0508 00:45:13.864983 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.864951869 podStartE2EDuration="1.864951869s" podCreationTimestamp="2025-05-08 00:45:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:45:13.639946165 +0000 UTC m=+1.199806465" watchObservedRunningTime="2025-05-08 00:45:13.864951869 +0000 UTC m=+1.424812159" May 8 00:45:13.918028 kubelet[1998]: I0508 00:45:13.917943 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.917896539 podStartE2EDuration="1.917896539s" podCreationTimestamp="2025-05-08 00:45:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:45:13.865479168 +0000 UTC m=+1.425339468" watchObservedRunningTime="2025-05-08 00:45:13.917896539 +0000 UTC m=+1.477756839" May 8 00:45:13.931720 kubelet[1998]: I0508 00:45:13.931633 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.9316045179999999 podStartE2EDuration="1.931604518s" podCreationTimestamp="2025-05-08 00:45:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:45:13.91831624 +0000 UTC m=+1.478176540" watchObservedRunningTime="2025-05-08 00:45:13.931604518 +0000 UTC m=+1.491464838" May 8 00:45:13.960000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:13.960000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0008ec360 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:45:13.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:45:13.960000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:13.960000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:13.960000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005f76e0 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:45:13.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:45:13.960000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000858160 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:45:13.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:45:13.960000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:45:13.960000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0005f7720 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:45:13.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:45:14.571637 kubelet[1998]: E0508 00:45:14.571603 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:14.572921 kubelet[1998]: E0508 00:45:14.572284 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:14.573164 kubelet[1998]: E0508 00:45:14.572760 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:15.514000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 8 00:45:15.514000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000660b80 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:45:15.514000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:45:18.090416 sudo[1381]: pam_unix(sudo:session): session closed for user root May 8 00:45:18.089000 audit[1381]: USER_END pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:45:18.091518 kernel: kauditd_printk_skb: 275 callbacks suppressed May 8 00:45:18.091591 kernel: audit: type=1106 audit(1746665118.089:803): pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:45:18.092084 sshd[1369]: pam_unix(sshd:session): session closed for user core May 8 00:45:18.094658 systemd[1]: sshd@8-10.0.0.60:22-10.0.0.1:49816.service: Deactivated successfully. May 8 00:45:18.089000 audit[1381]: CRED_DISP pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:45:18.095462 systemd[1]: session-9.scope: Deactivated successfully. May 8 00:45:18.095616 systemd[1]: session-9.scope: Consumed 4.760s CPU time. May 8 00:45:18.096315 systemd-logind[1208]: Session 9 logged out. Waiting for processes to exit. May 8 00:45:18.097074 systemd-logind[1208]: Removed session 9. May 8 00:45:18.098489 kernel: audit: type=1104 audit(1746665118.089:804): pid=1381 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:45:18.098577 kernel: audit: type=1106 audit(1746665118.091:805): pid=1369 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:18.091000 audit[1369]: USER_END pid=1369 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:18.091000 audit[1369]: CRED_DISP pid=1369 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:18.106484 kernel: audit: type=1104 audit(1746665118.091:806): pid=1369 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:18.106558 kernel: audit: type=1131 audit(1746665118.091:807): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.60:22-10.0.0.1:49816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:18.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.60:22-10.0.0.1:49816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:18.376948 kubelet[1998]: I0508 00:45:18.376806 1998 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 8 00:45:18.377369 env[1227]: time="2025-05-08T00:45:18.377282047Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 8 00:45:18.377571 kubelet[1998]: I0508 00:45:18.377440 1998 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 8 00:45:19.138046 systemd[1]: Created slice kubepods-besteffort-pod14716c9e_f739_478f_bba7_eac271d5f1c7.slice. May 8 00:45:19.325982 kubelet[1998]: I0508 00:45:19.325900 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/14716c9e-f739-478f-bba7-eac271d5f1c7-kube-proxy\") pod \"kube-proxy-ltsc5\" (UID: \"14716c9e-f739-478f-bba7-eac271d5f1c7\") " pod="kube-system/kube-proxy-ltsc5" May 8 00:45:19.325982 kubelet[1998]: I0508 00:45:19.325990 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q46p9\" (UniqueName: \"kubernetes.io/projected/14716c9e-f739-478f-bba7-eac271d5f1c7-kube-api-access-q46p9\") pod \"kube-proxy-ltsc5\" (UID: \"14716c9e-f739-478f-bba7-eac271d5f1c7\") " pod="kube-system/kube-proxy-ltsc5" May 8 00:45:19.326206 kubelet[1998]: I0508 00:45:19.326055 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/14716c9e-f739-478f-bba7-eac271d5f1c7-xtables-lock\") pod \"kube-proxy-ltsc5\" (UID: \"14716c9e-f739-478f-bba7-eac271d5f1c7\") " pod="kube-system/kube-proxy-ltsc5" May 8 00:45:19.326206 kubelet[1998]: I0508 00:45:19.326079 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/14716c9e-f739-478f-bba7-eac271d5f1c7-lib-modules\") pod \"kube-proxy-ltsc5\" (UID: \"14716c9e-f739-478f-bba7-eac271d5f1c7\") " pod="kube-system/kube-proxy-ltsc5" May 8 00:45:19.451896 kubelet[1998]: I0508 00:45:19.451733 1998 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 8 00:45:19.544476 systemd[1]: Created slice kubepods-besteffort-podf378de70_2a59_4c83_bfde_7873ba954f6e.slice. May 8 00:45:19.627506 kubelet[1998]: I0508 00:45:19.627446 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f378de70-2a59-4c83-bfde-7873ba954f6e-var-lib-calico\") pod \"tigera-operator-789496d6f5-tsfcl\" (UID: \"f378de70-2a59-4c83-bfde-7873ba954f6e\") " pod="tigera-operator/tigera-operator-789496d6f5-tsfcl" May 8 00:45:19.627693 kubelet[1998]: I0508 00:45:19.627528 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xzhkr\" (UniqueName: \"kubernetes.io/projected/f378de70-2a59-4c83-bfde-7873ba954f6e-kube-api-access-xzhkr\") pod \"tigera-operator-789496d6f5-tsfcl\" (UID: \"f378de70-2a59-4c83-bfde-7873ba954f6e\") " pod="tigera-operator/tigera-operator-789496d6f5-tsfcl" May 8 00:45:19.747759 kubelet[1998]: E0508 00:45:19.747659 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:19.748437 env[1227]: time="2025-05-08T00:45:19.748362493Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ltsc5,Uid:14716c9e-f739-478f-bba7-eac271d5f1c7,Namespace:kube-system,Attempt:0,}" May 8 00:45:19.775743 env[1227]: time="2025-05-08T00:45:19.775538258Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:45:19.775743 env[1227]: time="2025-05-08T00:45:19.775589838Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:45:19.775743 env[1227]: time="2025-05-08T00:45:19.775602656Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:45:19.775963 env[1227]: time="2025-05-08T00:45:19.775772889Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6a1ab8692a3d1281d5ee29368be441768b2a9662e100ae734b54fd00298d171d pid=2094 runtime=io.containerd.runc.v2 May 8 00:45:19.794636 systemd[1]: Started cri-containerd-6a1ab8692a3d1281d5ee29368be441768b2a9662e100ae734b54fd00298d171d.scope. May 8 00:45:19.891954 env[1227]: time="2025-05-08T00:45:19.891870081Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-tsfcl,Uid:f378de70-2a59-4c83-bfde-7873ba954f6e,Namespace:tigera-operator,Attempt:0,}" May 8 00:45:19.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.907698 kernel: audit: type=1400 audit(1746665119.899:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.907845 kernel: audit: type=1400 audit(1746665119.899:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.915477 kernel: audit: type=1400 audit(1746665119.899:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.915543 kernel: audit: type=1400 audit(1746665119.899:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.919106 kernel: audit: type=1400 audit(1746665119.899:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.903000 audit: BPF prog-id=103 op=LOAD May 8 00:45:19.903000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.903000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2094 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:19.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661316162383639326133643132383164356565323933363862653434 May 8 00:45:19.903000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.903000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2094 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:19.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661316162383639326133643132383164356565323933363862653434 May 8 00:45:19.904000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.904000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.904000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.904000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.904000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.904000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.904000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.904000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.904000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.904000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.904000 audit: BPF prog-id=104 op=LOAD May 8 00:45:19.904000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002149b0 items=0 ppid=2094 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:19.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661316162383639326133643132383164356565323933363862653434 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit: BPF prog-id=105 op=LOAD May 8 00:45:19.906000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002149f8 items=0 ppid=2094 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:19.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661316162383639326133643132383164356565323933363862653434 May 8 00:45:19.906000 audit: BPF prog-id=105 op=UNLOAD May 8 00:45:19.906000 audit: BPF prog-id=104 op=UNLOAD May 8 00:45:19.906000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { perfmon } for pid=2104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit[2104]: AVC avc: denied { bpf } for pid=2104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.906000 audit: BPF prog-id=106 op=LOAD May 8 00:45:19.906000 audit[2104]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000214e08 items=0 ppid=2094 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:19.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661316162383639326133643132383164356565323933363862653434 May 8 00:45:19.922512 env[1227]: time="2025-05-08T00:45:19.922425468Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:45:19.922652 env[1227]: time="2025-05-08T00:45:19.922500668Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:45:19.922652 env[1227]: time="2025-05-08T00:45:19.922530902Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:45:19.924393 env[1227]: time="2025-05-08T00:45:19.923053888Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6a590d52ae0accaeaabc52ce791ee25f9b1950c1e505f6af9e834b82773251ea pid=2127 runtime=io.containerd.runc.v2 May 8 00:45:19.931765 env[1227]: time="2025-05-08T00:45:19.931671245Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ltsc5,Uid:14716c9e-f739-478f-bba7-eac271d5f1c7,Namespace:kube-system,Attempt:0,} returns sandbox id \"6a1ab8692a3d1281d5ee29368be441768b2a9662e100ae734b54fd00298d171d\"" May 8 00:45:19.940759 env[1227]: time="2025-05-08T00:45:19.936384643Z" level=info msg="CreateContainer within sandbox \"6a1ab8692a3d1281d5ee29368be441768b2a9662e100ae734b54fd00298d171d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 8 00:45:19.938396 systemd[1]: Started cri-containerd-6a590d52ae0accaeaabc52ce791ee25f9b1950c1e505f6af9e834b82773251ea.scope. May 8 00:45:19.941368 kubelet[1998]: E0508 00:45:19.932616 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:19.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.957000 audit: BPF prog-id=107 op=LOAD May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2127 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:19.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661353930643532616530616363616561616263353263653739316565 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2127 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:19.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661353930643532616530616363616561616263353263653739316565 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit: BPF prog-id=108 op=LOAD May 8 00:45:19.958000 audit[2139]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e1ac0 items=0 ppid=2127 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:19.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661353930643532616530616363616561616263353263653739316565 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit: BPF prog-id=109 op=LOAD May 8 00:45:19.958000 audit[2139]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e1b08 items=0 ppid=2127 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:19.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661353930643532616530616363616561616263353263653739316565 May 8 00:45:19.958000 audit: BPF prog-id=109 op=UNLOAD May 8 00:45:19.958000 audit: BPF prog-id=108 op=UNLOAD May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:19.958000 audit: BPF prog-id=110 op=LOAD May 8 00:45:19.958000 audit[2139]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001e1f18 items=0 ppid=2127 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:19.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661353930643532616530616363616561616263353263653739316565 May 8 00:45:19.985609 env[1227]: time="2025-05-08T00:45:19.985536731Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-tsfcl,Uid:f378de70-2a59-4c83-bfde-7873ba954f6e,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6a590d52ae0accaeaabc52ce791ee25f9b1950c1e505f6af9e834b82773251ea\"" May 8 00:45:19.987556 env[1227]: time="2025-05-08T00:45:19.987492544Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 8 00:45:20.002267 env[1227]: time="2025-05-08T00:45:20.002109099Z" level=info msg="CreateContainer within sandbox \"6a1ab8692a3d1281d5ee29368be441768b2a9662e100ae734b54fd00298d171d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"fb5622bfb3bfa6d85cf9159784f8e5d859432cc4737d2ddbc33040936f7c263d\"" May 8 00:45:20.003226 env[1227]: time="2025-05-08T00:45:20.003173818Z" level=info msg="StartContainer for \"fb5622bfb3bfa6d85cf9159784f8e5d859432cc4737d2ddbc33040936f7c263d\"" May 8 00:45:20.021755 systemd[1]: Started cri-containerd-fb5622bfb3bfa6d85cf9159784f8e5d859432cc4737d2ddbc33040936f7c263d.scope. May 8 00:45:20.037000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.037000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f35b5ffcac8 items=0 ppid=2094 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353632326266623362666136643835636639313539373834663865 May 8 00:45:20.037000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.037000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.037000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.037000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.037000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.037000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.037000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.037000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.037000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.037000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.037000 audit: BPF prog-id=111 op=LOAD May 8 00:45:20.037000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002d5ba8 items=0 ppid=2094 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353632326266623362666136643835636639313539373834663865 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit: BPF prog-id=112 op=LOAD May 8 00:45:20.038000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002d5bf8 items=0 ppid=2094 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353632326266623362666136643835636639313539373834663865 May 8 00:45:20.038000 audit: BPF prog-id=112 op=UNLOAD May 8 00:45:20.038000 audit: BPF prog-id=111 op=UNLOAD May 8 00:45:20.038000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { perfmon } for pid=2174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit[2174]: AVC avc: denied { bpf } for pid=2174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:20.038000 audit: BPF prog-id=113 op=LOAD May 8 00:45:20.038000 audit[2174]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002d5c88 items=0 ppid=2094 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662353632326266623362666136643835636639313539373834663865 May 8 00:45:20.050947 kubelet[1998]: E0508 00:45:20.050155 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:20.056314 env[1227]: time="2025-05-08T00:45:20.056250973Z" level=info msg="StartContainer for \"fb5622bfb3bfa6d85cf9159784f8e5d859432cc4737d2ddbc33040936f7c263d\" returns successfully" May 8 00:45:20.237000 audit[2237]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.237000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc14eba910 a2=0 a3=7ffc14eba8fc items=0 ppid=2184 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:45:20.237000 audit[2236]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.237000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc96be0dd0 a2=0 a3=390fe326a4c2f2b5 items=0 ppid=2184 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:45:20.238000 audit[2238]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.238000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff0e00270 a2=0 a3=7ffff0e0025c items=0 ppid=2184 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:45:20.239000 audit[2239]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.239000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef0d0fca0 a2=0 a3=7ffef0d0fc8c items=0 ppid=2184 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:45:20.240000 audit[2241]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.240000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff76d6740 a2=0 a3=7ffff76d672c items=0 ppid=2184 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:45:20.241000 audit[2242]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.241000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeeed513a0 a2=0 a3=7ffeeed5138c items=0 ppid=2184 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.241000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:45:20.340000 audit[2243]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.340000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd908e76e0 a2=0 a3=7ffd908e76cc items=0 ppid=2184 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:45:20.342000 audit[2245]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.342000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff61f932e0 a2=0 a3=7fff61f932cc items=0 ppid=2184 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 8 00:45:20.345000 audit[2248]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.345000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd206ac440 a2=0 a3=7ffd206ac42c items=0 ppid=2184 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 8 00:45:20.346000 audit[2249]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.346000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef17b6fc0 a2=0 a3=7ffef17b6fac items=0 ppid=2184 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:45:20.348000 audit[2251]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.348000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc13411bf0 a2=0 a3=7ffc13411bdc items=0 ppid=2184 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:45:20.349000 audit[2252]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.349000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd130782f0 a2=0 a3=7ffd130782dc items=0 ppid=2184 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.349000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:45:20.351000 audit[2254]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.351000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff98ebf10 a2=0 a3=7ffff98ebefc items=0 ppid=2184 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:45:20.354000 audit[2257]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.354000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff8665c5c0 a2=0 a3=7fff8665c5ac items=0 ppid=2184 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 8 00:45:20.355000 audit[2258]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.355000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4aa778a0 a2=0 a3=7ffe4aa7788c items=0 ppid=2184 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:45:20.357000 audit[2260]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.357000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd029e6990 a2=0 a3=7ffd029e697c items=0 ppid=2184 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:45:20.358000 audit[2261]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.358000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff243f08e0 a2=0 a3=7fff243f08cc items=0 ppid=2184 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:45:20.360000 audit[2263]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.360000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6f4fae50 a2=0 a3=7ffe6f4fae3c items=0 ppid=2184 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.360000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:45:20.363000 audit[2266]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.363000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff140906c0 a2=0 a3=7fff140906ac items=0 ppid=2184 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:45:20.366000 audit[2269]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.366000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc257e3d0 a2=0 a3=7ffdc257e3bc items=0 ppid=2184 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:45:20.367000 audit[2270]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.367000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffdc0ba000 a2=0 a3=7fffdc0b9fec items=0 ppid=2184 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:45:20.369000 audit[2272]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.369000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffffaf0ddd0 a2=0 a3=7ffffaf0ddbc items=0 ppid=2184 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:45:20.372000 audit[2275]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.372000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9890e370 a2=0 a3=7ffc9890e35c items=0 ppid=2184 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:45:20.373000 audit[2276]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.373000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedad026d0 a2=0 a3=7ffedad026bc items=0 ppid=2184 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:45:20.375000 audit[2278]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:45:20.375000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd278b1670 a2=0 a3=7ffd278b165c items=0 ppid=2184 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:45:20.517000 audit[2284]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:45:20.517000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd8921e0a0 a2=0 a3=7ffd8921e08c items=0 ppid=2184 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:20.531000 audit[2284]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:45:20.531000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd8921e0a0 a2=0 a3=7ffd8921e08c items=0 ppid=2184 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:20.532000 audit[2289]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.532000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdab93f790 a2=0 a3=7ffdab93f77c items=0 ppid=2184 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:45:20.535000 audit[2291]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.535000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffebed591b0 a2=0 a3=7ffebed5919c items=0 ppid=2184 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 8 00:45:20.538000 audit[2294]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.538000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc67e04540 a2=0 a3=7ffc67e0452c items=0 ppid=2184 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 8 00:45:20.539000 audit[2295]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.539000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5c6fe070 a2=0 a3=7ffd5c6fe05c items=0 ppid=2184 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:45:20.541000 audit[2297]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.541000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf6c286d0 a2=0 a3=7ffcf6c286bc items=0 ppid=2184 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:45:20.542000 audit[2298]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.542000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd814b0cb0 a2=0 a3=7ffd814b0c9c items=0 ppid=2184 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:45:20.544000 audit[2300]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.544000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffc86c2300 a2=0 a3=7fffc86c22ec items=0 ppid=2184 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 8 00:45:20.547000 audit[2303]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.547000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff81b86a90 a2=0 a3=7fff81b86a7c items=0 ppid=2184 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.547000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:45:20.548000 audit[2304]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.548000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce248de50 a2=0 a3=7ffce248de3c items=0 ppid=2184 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:45:20.551000 audit[2306]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.551000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc7a96cd70 a2=0 a3=7ffc7a96cd5c items=0 ppid=2184 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:45:20.552000 audit[2307]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.552000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3cb4e6e0 a2=0 a3=7fff3cb4e6cc items=0 ppid=2184 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:45:20.554000 audit[2309]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.554000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd61b93f0 a2=0 a3=7ffcd61b93dc items=0 ppid=2184 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:45:20.558000 audit[2312]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.558000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe00833280 a2=0 a3=7ffe0083326c items=0 ppid=2184 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:45:20.561000 audit[2315]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.561000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffee5be7d0 a2=0 a3=7fffee5be7bc items=0 ppid=2184 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 8 00:45:20.562000 audit[2316]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.562000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1e19b530 a2=0 a3=7fff1e19b51c items=0 ppid=2184 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:45:20.565000 audit[2318]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.565000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd0f592500 a2=0 a3=7ffd0f5924ec items=0 ppid=2184 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:45:20.568000 audit[2321]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.568000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffde6e58830 a2=0 a3=7ffde6e5881c items=0 ppid=2184 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:45:20.569000 audit[2322]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.569000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd10740b0 a2=0 a3=7ffdd107409c items=0 ppid=2184 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:45:20.571000 audit[2324]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.571000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd9a88e840 a2=0 a3=7ffd9a88e82c items=0 ppid=2184 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:45:20.572000 audit[2325]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.572000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa6329430 a2=0 a3=7fffa632941c items=0 ppid=2184 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:45:20.574000 audit[2327]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.574000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff263db060 a2=0 a3=7fff263db04c items=0 ppid=2184 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:45:20.577000 audit[2330]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:45:20.577000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffee3736ae0 a2=0 a3=7ffee3736acc items=0 ppid=2184 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:45:20.582000 audit[2332]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:45:20.582000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe040e6610 a2=0 a3=7ffe040e65fc items=0 ppid=2184 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.582000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:20.583000 audit[2332]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:45:20.583000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe040e6610 a2=0 a3=7ffe040e65fc items=0 ppid=2184 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:20.583000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:20.584531 kubelet[1998]: E0508 00:45:20.584419 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:20.585309 kubelet[1998]: E0508 00:45:20.585208 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:20.606448 kubelet[1998]: I0508 00:45:20.606262 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-ltsc5" podStartSLOduration=1.606237105 podStartE2EDuration="1.606237105s" podCreationTimestamp="2025-05-08 00:45:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:45:20.596381073 +0000 UTC m=+8.156241363" watchObservedRunningTime="2025-05-08 00:45:20.606237105 +0000 UTC m=+8.166097405" May 8 00:45:21.587126 kubelet[1998]: E0508 00:45:21.587090 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:22.595887 kubelet[1998]: E0508 00:45:22.595827 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:23.252328 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1569949774.mount: Deactivated successfully. May 8 00:45:23.589765 kubelet[1998]: E0508 00:45:23.589725 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:23.795455 kubelet[1998]: E0508 00:45:23.795413 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:24.027744 env[1227]: time="2025-05-08T00:45:24.027673792Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:24.030055 env[1227]: time="2025-05-08T00:45:24.029995392Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:24.031327 env[1227]: time="2025-05-08T00:45:24.031292747Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:24.033070 env[1227]: time="2025-05-08T00:45:24.033020319Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:24.033587 env[1227]: time="2025-05-08T00:45:24.033545444Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 8 00:45:24.036148 env[1227]: time="2025-05-08T00:45:24.036105801Z" level=info msg="CreateContainer within sandbox \"6a590d52ae0accaeaabc52ce791ee25f9b1950c1e505f6af9e834b82773251ea\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 8 00:45:24.051400 env[1227]: time="2025-05-08T00:45:24.051316233Z" level=info msg="CreateContainer within sandbox \"6a590d52ae0accaeaabc52ce791ee25f9b1950c1e505f6af9e834b82773251ea\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"63c1fa79eb3ca9a26b3bbd31f0d9dbfad77467850ca61a641f4a9aba7931ea49\"" May 8 00:45:24.052062 env[1227]: time="2025-05-08T00:45:24.052013356Z" level=info msg="StartContainer for \"63c1fa79eb3ca9a26b3bbd31f0d9dbfad77467850ca61a641f4a9aba7931ea49\"" May 8 00:45:24.068302 systemd[1]: Started cri-containerd-63c1fa79eb3ca9a26b3bbd31f0d9dbfad77467850ca61a641f4a9aba7931ea49.scope. May 8 00:45:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.085679 kernel: kauditd_printk_skb: 305 callbacks suppressed May 8 00:45:24.085747 kernel: audit: type=1400 audit(1746665124.083:901): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.092185 kernel: audit: type=1400 audit(1746665124.083:902): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.092273 kernel: audit: type=1400 audit(1746665124.083:903): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.099083 kernel: audit: type=1400 audit(1746665124.083:904): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.099144 kernel: audit: type=1400 audit(1746665124.083:905): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.105945 kernel: audit: type=1400 audit(1746665124.083:906): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.106017 kernel: audit: type=1400 audit(1746665124.083:907): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.109054 kernel: audit: type=1400 audit(1746665124.083:908): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.114930 kernel: audit: type=1400 audit(1746665124.083:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.115026 kernel: audit: type=1400 audit(1746665124.088:910): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit: BPF prog-id=114 op=LOAD May 8 00:45:24.088000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[2341]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2127 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:24.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633633166613739656233636139613236623362626433316630643964 May 8 00:45:24.088000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[2341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2127 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:24.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633633166613739656233636139613236623362626433316630643964 May 8 00:45:24.088000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.088000 audit: BPF prog-id=115 op=LOAD May 8 00:45:24.088000 audit[2341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000284860 items=0 ppid=2127 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:24.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633633166613739656233636139613236623362626433316630643964 May 8 00:45:24.094000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.094000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.094000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.094000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.094000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.094000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.094000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.094000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.094000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.094000 audit: BPF prog-id=116 op=LOAD May 8 00:45:24.094000 audit[2341]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002848a8 items=0 ppid=2127 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:24.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633633166613739656233636139613236623362626433316630643964 May 8 00:45:24.101000 audit: BPF prog-id=116 op=UNLOAD May 8 00:45:24.101000 audit: BPF prog-id=115 op=UNLOAD May 8 00:45:24.101000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.101000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.101000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.101000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.101000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.101000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.101000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.101000 audit[2341]: AVC avc: denied { perfmon } for pid=2341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.101000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.101000 audit[2341]: AVC avc: denied { bpf } for pid=2341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:24.101000 audit: BPF prog-id=117 op=LOAD May 8 00:45:24.101000 audit[2341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000284cb8 items=0 ppid=2127 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:24.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633633166613739656233636139613236623362626433316630643964 May 8 00:45:24.134520 env[1227]: time="2025-05-08T00:45:24.134468650Z" level=info msg="StartContainer for \"63c1fa79eb3ca9a26b3bbd31f0d9dbfad77467850ca61a641f4a9aba7931ea49\" returns successfully" May 8 00:45:24.621644 kubelet[1998]: I0508 00:45:24.621564 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-tsfcl" podStartSLOduration=1.5739489789999999 podStartE2EDuration="5.62154546s" podCreationTimestamp="2025-05-08 00:45:19 +0000 UTC" firstStartedPulling="2025-05-08 00:45:19.987011677 +0000 UTC m=+7.546871978" lastFinishedPulling="2025-05-08 00:45:24.034608159 +0000 UTC m=+11.594468459" observedRunningTime="2025-05-08 00:45:24.621237617 +0000 UTC m=+12.181097917" watchObservedRunningTime="2025-05-08 00:45:24.62154546 +0000 UTC m=+12.181405760" May 8 00:45:26.908000 audit[2375]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:45:26.908000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc2608eb60 a2=0 a3=7ffc2608eb4c items=0 ppid=2184 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:26.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:26.912000 audit[2375]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:45:26.912000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc2608eb60 a2=0 a3=0 items=0 ppid=2184 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:26.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:26.927000 audit[2377]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:45:26.927000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff32abea90 a2=0 a3=7fff32abea7c items=0 ppid=2184 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:26.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:26.932000 audit[2377]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:45:26.932000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff32abea90 a2=0 a3=0 items=0 ppid=2184 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:26.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:27.225989 systemd[1]: Created slice kubepods-besteffort-podad8417e9_13d1_45ba_ae9d_9922b805e4f8.slice. May 8 00:45:27.293541 systemd[1]: Created slice kubepods-besteffort-pod86ed9c40_8cd9_4d76_9be5_bbed72ace660.slice. May 8 00:45:27.336488 kubelet[1998]: I0508 00:45:27.336413 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9t58f\" (UniqueName: \"kubernetes.io/projected/ad8417e9-13d1-45ba-ae9d-9922b805e4f8-kube-api-access-9t58f\") pod \"calico-typha-74c787cbdb-gw7zs\" (UID: \"ad8417e9-13d1-45ba-ae9d-9922b805e4f8\") " pod="calico-system/calico-typha-74c787cbdb-gw7zs" May 8 00:45:27.336488 kubelet[1998]: I0508 00:45:27.336481 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ad8417e9-13d1-45ba-ae9d-9922b805e4f8-tigera-ca-bundle\") pod \"calico-typha-74c787cbdb-gw7zs\" (UID: \"ad8417e9-13d1-45ba-ae9d-9922b805e4f8\") " pod="calico-system/calico-typha-74c787cbdb-gw7zs" May 8 00:45:27.336954 kubelet[1998]: I0508 00:45:27.336510 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/ad8417e9-13d1-45ba-ae9d-9922b805e4f8-typha-certs\") pod \"calico-typha-74c787cbdb-gw7zs\" (UID: \"ad8417e9-13d1-45ba-ae9d-9922b805e4f8\") " pod="calico-system/calico-typha-74c787cbdb-gw7zs" May 8 00:45:27.402747 kubelet[1998]: E0508 00:45:27.402692 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:27.437025 kubelet[1998]: I0508 00:45:27.436953 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/86ed9c40-8cd9-4d76-9be5-bbed72ace660-cni-net-dir\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437025 kubelet[1998]: I0508 00:45:27.437014 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/86ed9c40-8cd9-4d76-9be5-bbed72ace660-cni-log-dir\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437025 kubelet[1998]: I0508 00:45:27.437029 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/86ed9c40-8cd9-4d76-9be5-bbed72ace660-lib-modules\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437025 kubelet[1998]: I0508 00:45:27.437041 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/72562622-3187-4bfb-96bf-cf9ba7859ac7-kubelet-dir\") pod \"csi-node-driver-66j7s\" (UID: \"72562622-3187-4bfb-96bf-cf9ba7859ac7\") " pod="calico-system/csi-node-driver-66j7s" May 8 00:45:27.437383 kubelet[1998]: I0508 00:45:27.437060 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/86ed9c40-8cd9-4d76-9be5-bbed72ace660-cni-bin-dir\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437383 kubelet[1998]: I0508 00:45:27.437073 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/86ed9c40-8cd9-4d76-9be5-bbed72ace660-policysync\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437383 kubelet[1998]: I0508 00:45:27.437085 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/86ed9c40-8cd9-4d76-9be5-bbed72ace660-var-run-calico\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437383 kubelet[1998]: I0508 00:45:27.437105 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ztqdh\" (UniqueName: \"kubernetes.io/projected/86ed9c40-8cd9-4d76-9be5-bbed72ace660-kube-api-access-ztqdh\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437383 kubelet[1998]: I0508 00:45:27.437127 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/86ed9c40-8cd9-4d76-9be5-bbed72ace660-xtables-lock\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437525 kubelet[1998]: I0508 00:45:27.437174 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/86ed9c40-8cd9-4d76-9be5-bbed72ace660-var-lib-calico\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437525 kubelet[1998]: I0508 00:45:27.437223 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/86ed9c40-8cd9-4d76-9be5-bbed72ace660-node-certs\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437525 kubelet[1998]: I0508 00:45:27.437248 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/72562622-3187-4bfb-96bf-cf9ba7859ac7-socket-dir\") pod \"csi-node-driver-66j7s\" (UID: \"72562622-3187-4bfb-96bf-cf9ba7859ac7\") " pod="calico-system/csi-node-driver-66j7s" May 8 00:45:27.437525 kubelet[1998]: I0508 00:45:27.437269 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m8x4m\" (UniqueName: \"kubernetes.io/projected/72562622-3187-4bfb-96bf-cf9ba7859ac7-kube-api-access-m8x4m\") pod \"csi-node-driver-66j7s\" (UID: \"72562622-3187-4bfb-96bf-cf9ba7859ac7\") " pod="calico-system/csi-node-driver-66j7s" May 8 00:45:27.437525 kubelet[1998]: I0508 00:45:27.437299 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/86ed9c40-8cd9-4d76-9be5-bbed72ace660-tigera-ca-bundle\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437654 kubelet[1998]: I0508 00:45:27.437323 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/86ed9c40-8cd9-4d76-9be5-bbed72ace660-flexvol-driver-host\") pod \"calico-node-bmxb9\" (UID: \"86ed9c40-8cd9-4d76-9be5-bbed72ace660\") " pod="calico-system/calico-node-bmxb9" May 8 00:45:27.437654 kubelet[1998]: I0508 00:45:27.437349 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/72562622-3187-4bfb-96bf-cf9ba7859ac7-varrun\") pod \"csi-node-driver-66j7s\" (UID: \"72562622-3187-4bfb-96bf-cf9ba7859ac7\") " pod="calico-system/csi-node-driver-66j7s" May 8 00:45:27.437654 kubelet[1998]: I0508 00:45:27.437384 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/72562622-3187-4bfb-96bf-cf9ba7859ac7-registration-dir\") pod \"csi-node-driver-66j7s\" (UID: \"72562622-3187-4bfb-96bf-cf9ba7859ac7\") " pod="calico-system/csi-node-driver-66j7s" May 8 00:45:27.532891 kubelet[1998]: E0508 00:45:27.532848 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:27.533508 env[1227]: time="2025-05-08T00:45:27.533417749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-74c787cbdb-gw7zs,Uid:ad8417e9-13d1-45ba-ae9d-9922b805e4f8,Namespace:calico-system,Attempt:0,}" May 8 00:45:27.540093 kubelet[1998]: E0508 00:45:27.540031 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:27.540093 kubelet[1998]: W0508 00:45:27.540057 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:27.540093 kubelet[1998]: E0508 00:45:27.540088 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:27.541860 kubelet[1998]: E0508 00:45:27.541829 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:27.541860 kubelet[1998]: W0508 00:45:27.541849 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:27.541860 kubelet[1998]: E0508 00:45:27.541867 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:27.612997 kubelet[1998]: E0508 00:45:27.608951 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:27.612997 kubelet[1998]: W0508 00:45:27.608985 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:27.612997 kubelet[1998]: E0508 00:45:27.609013 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:27.612997 kubelet[1998]: E0508 00:45:27.610401 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:27.612997 kubelet[1998]: W0508 00:45:27.610418 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:27.612997 kubelet[1998]: E0508 00:45:27.610438 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:27.624605 env[1227]: time="2025-05-08T00:45:27.624520853Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:45:27.624605 env[1227]: time="2025-05-08T00:45:27.624573181Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:45:27.624605 env[1227]: time="2025-05-08T00:45:27.624582981Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:45:27.624958 env[1227]: time="2025-05-08T00:45:27.624888732Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2a4d3bf3c3dabfcc38f0b46b66c02e13b005c4011af3d5f9feedb3183accc63 pid=2393 runtime=io.containerd.runc.v2 May 8 00:45:27.637589 systemd[1]: Started cri-containerd-d2a4d3bf3c3dabfcc38f0b46b66c02e13b005c4011af3d5f9feedb3183accc63.scope. May 8 00:45:27.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.652000 audit: BPF prog-id=118 op=LOAD May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2393 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432613464336266336333646162666363333866306234366236366330 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2393 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432613464336266336333646162666363333866306234366236366330 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit: BPF prog-id=119 op=LOAD May 8 00:45:27.654000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000229040 items=0 ppid=2393 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432613464336266336333646162666363333866306234366236366330 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit: BPF prog-id=120 op=LOAD May 8 00:45:27.654000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000229088 items=0 ppid=2393 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432613464336266336333646162666363333866306234366236366330 May 8 00:45:27.654000 audit: BPF prog-id=120 op=UNLOAD May 8 00:45:27.654000 audit: BPF prog-id=119 op=UNLOAD May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.654000 audit: BPF prog-id=121 op=LOAD May 8 00:45:27.654000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000229498 items=0 ppid=2393 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432613464336266336333646162666363333866306234366236366330 May 8 00:45:27.682076 env[1227]: time="2025-05-08T00:45:27.682019026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-74c787cbdb-gw7zs,Uid:ad8417e9-13d1-45ba-ae9d-9922b805e4f8,Namespace:calico-system,Attempt:0,} returns sandbox id \"d2a4d3bf3c3dabfcc38f0b46b66c02e13b005c4011af3d5f9feedb3183accc63\"" May 8 00:45:27.682597 kubelet[1998]: E0508 00:45:27.682576 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:27.683539 env[1227]: time="2025-05-08T00:45:27.683504059Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 8 00:45:27.898416 kubelet[1998]: E0508 00:45:27.898205 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:27.898988 env[1227]: time="2025-05-08T00:45:27.898868716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bmxb9,Uid:86ed9c40-8cd9-4d76-9be5-bbed72ace660,Namespace:calico-system,Attempt:0,}" May 8 00:45:27.925214 env[1227]: time="2025-05-08T00:45:27.925110331Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:45:27.925214 env[1227]: time="2025-05-08T00:45:27.925164223Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:45:27.925214 env[1227]: time="2025-05-08T00:45:27.925174744Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:45:27.925435 env[1227]: time="2025-05-08T00:45:27.925329373Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5d7cb749676642ceec43a8b288822c52e1e91d93f1efcd997039dac6c3ce84e pid=2433 runtime=io.containerd.runc.v2 May 8 00:45:27.936963 systemd[1]: Started cri-containerd-d5d7cb749676642ceec43a8b288822c52e1e91d93f1efcd997039dac6c3ce84e.scope. May 8 00:45:27.949000 audit[2460]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:45:27.949000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe61b5fea0 a2=0 a3=7ffe61b5fe8c items=0 ppid=2184 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:27.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.950000 audit: BPF prog-id=122 op=LOAD May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2433 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643763623734393637363634326365656334336138623238383832 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2433 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643763623734393637363634326365656334336138623238383832 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit: BPF prog-id=123 op=LOAD May 8 00:45:27.951000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000025130 items=0 ppid=2433 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643763623734393637363634326365656334336138623238383832 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit: BPF prog-id=124 op=LOAD May 8 00:45:27.951000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000025178 items=0 ppid=2433 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643763623734393637363634326365656334336138623238383832 May 8 00:45:27.951000 audit: BPF prog-id=124 op=UNLOAD May 8 00:45:27.951000 audit: BPF prog-id=123 op=UNLOAD May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:27.951000 audit: BPF prog-id=125 op=LOAD May 8 00:45:27.951000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025588 items=0 ppid=2433 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643763623734393637363634326365656334336138623238383832 May 8 00:45:27.955000 audit[2460]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:45:27.955000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe61b5fea0 a2=0 a3=0 items=0 ppid=2184 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:27.955000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:27.968257 env[1227]: time="2025-05-08T00:45:27.968156271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bmxb9,Uid:86ed9c40-8cd9-4d76-9be5-bbed72ace660,Namespace:calico-system,Attempt:0,} returns sandbox id \"d5d7cb749676642ceec43a8b288822c52e1e91d93f1efcd997039dac6c3ce84e\"" May 8 00:45:27.969991 kubelet[1998]: E0508 00:45:27.969394 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:28.555063 kubelet[1998]: E0508 00:45:28.554981 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:30.554656 kubelet[1998]: E0508 00:45:30.554600 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:31.607757 env[1227]: time="2025-05-08T00:45:31.607614865Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:31.620678 env[1227]: time="2025-05-08T00:45:31.620599038Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:31.641445 env[1227]: time="2025-05-08T00:45:31.641358438Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:31.668868 env[1227]: time="2025-05-08T00:45:31.668760548Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:31.669647 env[1227]: time="2025-05-08T00:45:31.669600599Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 8 00:45:31.672992 env[1227]: time="2025-05-08T00:45:31.671329724Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 8 00:45:31.676848 env[1227]: time="2025-05-08T00:45:31.676795704Z" level=info msg="CreateContainer within sandbox \"d2a4d3bf3c3dabfcc38f0b46b66c02e13b005c4011af3d5f9feedb3183accc63\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 8 00:45:31.777020 env[1227]: time="2025-05-08T00:45:31.776896602Z" level=info msg="CreateContainer within sandbox \"d2a4d3bf3c3dabfcc38f0b46b66c02e13b005c4011af3d5f9feedb3183accc63\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"2c0d3653373ea951d241e682726d60b7740c86d3fa79bd97e32489b3e91214d6\"" May 8 00:45:31.777718 env[1227]: time="2025-05-08T00:45:31.777603723Z" level=info msg="StartContainer for \"2c0d3653373ea951d241e682726d60b7740c86d3fa79bd97e32489b3e91214d6\"" May 8 00:45:31.798605 systemd[1]: Started cri-containerd-2c0d3653373ea951d241e682726d60b7740c86d3fa79bd97e32489b3e91214d6.scope. May 8 00:45:31.828425 kernel: kauditd_printk_skb: 179 callbacks suppressed May 8 00:45:31.828658 kernel: audit: type=1400 audit(1746665131.821:961): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.835601 kernel: audit: type=1400 audit(1746665131.821:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.835790 kernel: audit: type=1400 audit(1746665131.821:963): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.843687 kernel: audit: type=1400 audit(1746665131.821:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.852340 kernel: audit: type=1400 audit(1746665131.821:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.852509 kernel: audit: type=1400 audit(1746665131.821:966): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.852538 kernel: audit: type=1400 audit(1746665131.821:967): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.860568 kernel: audit: type=1400 audit(1746665131.821:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.869936 kernel: audit: type=1400 audit(1746665131.821:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.870137 kernel: audit: type=1400 audit(1746665131.822:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.822000 audit: BPF prog-id=126 op=LOAD May 8 00:45:31.827000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2393 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:31.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306433363533333733656139353164323431653638323732366436 May 8 00:45:31.827000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2393 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:31.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306433363533333733656139353164323431653638323732366436 May 8 00:45:31.827000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.827000 audit: BPF prog-id=127 op=LOAD May 8 00:45:31.827000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024f960 items=0 ppid=2393 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:31.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306433363533333733656139353164323431653638323732366436 May 8 00:45:31.837000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.837000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.837000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.837000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.837000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.837000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.837000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.837000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.837000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.837000 audit: BPF prog-id=128 op=LOAD May 8 00:45:31.837000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024f9a8 items=0 ppid=2393 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:31.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306433363533333733656139353164323431653638323732366436 May 8 00:45:31.842000 audit: BPF prog-id=128 op=UNLOAD May 8 00:45:31.842000 audit: BPF prog-id=127 op=UNLOAD May 8 00:45:31.842000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.842000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.842000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.842000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.842000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.842000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.842000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.842000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.842000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.842000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:31.842000 audit: BPF prog-id=129 op=LOAD May 8 00:45:31.842000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024fdb8 items=0 ppid=2393 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:31.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306433363533333733656139353164323431653638323732366436 May 8 00:45:32.208201 env[1227]: time="2025-05-08T00:45:32.207967241Z" level=info msg="StartContainer for \"2c0d3653373ea951d241e682726d60b7740c86d3fa79bd97e32489b3e91214d6\" returns successfully" May 8 00:45:32.556930 kubelet[1998]: E0508 00:45:32.554978 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:32.611335 kubelet[1998]: E0508 00:45:32.611283 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:32.668619 kubelet[1998]: E0508 00:45:32.668582 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.668619 kubelet[1998]: W0508 00:45:32.668606 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.668619 kubelet[1998]: E0508 00:45:32.668628 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.668943 kubelet[1998]: E0508 00:45:32.668797 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.668943 kubelet[1998]: W0508 00:45:32.668805 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.668943 kubelet[1998]: E0508 00:45:32.668812 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.669083 kubelet[1998]: E0508 00:45:32.668986 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.669083 kubelet[1998]: W0508 00:45:32.668996 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.669083 kubelet[1998]: E0508 00:45:32.669006 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.669249 kubelet[1998]: E0508 00:45:32.669234 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.669249 kubelet[1998]: W0508 00:45:32.669244 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.669249 kubelet[1998]: E0508 00:45:32.669252 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.669401 kubelet[1998]: E0508 00:45:32.669390 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.669401 kubelet[1998]: W0508 00:45:32.669399 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.669467 kubelet[1998]: E0508 00:45:32.669406 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.669557 kubelet[1998]: E0508 00:45:32.669545 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.669557 kubelet[1998]: W0508 00:45:32.669554 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.669632 kubelet[1998]: E0508 00:45:32.669561 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.669687 kubelet[1998]: E0508 00:45:32.669678 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.669687 kubelet[1998]: W0508 00:45:32.669686 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.669747 kubelet[1998]: E0508 00:45:32.669693 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.669844 kubelet[1998]: E0508 00:45:32.669832 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.669844 kubelet[1998]: W0508 00:45:32.669841 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.669942 kubelet[1998]: E0508 00:45:32.669848 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.669999 kubelet[1998]: E0508 00:45:32.669988 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.669999 kubelet[1998]: W0508 00:45:32.669998 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.670062 kubelet[1998]: E0508 00:45:32.670005 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.670170 kubelet[1998]: E0508 00:45:32.670156 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.670170 kubelet[1998]: W0508 00:45:32.670165 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.670170 kubelet[1998]: E0508 00:45:32.670173 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.670324 kubelet[1998]: E0508 00:45:32.670312 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.670324 kubelet[1998]: W0508 00:45:32.670322 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.670400 kubelet[1998]: E0508 00:45:32.670331 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.670496 kubelet[1998]: E0508 00:45:32.670484 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.670496 kubelet[1998]: W0508 00:45:32.670493 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.670578 kubelet[1998]: E0508 00:45:32.670500 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.670652 kubelet[1998]: E0508 00:45:32.670641 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.670652 kubelet[1998]: W0508 00:45:32.670649 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.670722 kubelet[1998]: E0508 00:45:32.670656 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.671028 kubelet[1998]: E0508 00:45:32.670792 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.671028 kubelet[1998]: W0508 00:45:32.670810 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.671028 kubelet[1998]: E0508 00:45:32.670819 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.671028 kubelet[1998]: E0508 00:45:32.670961 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.671028 kubelet[1998]: W0508 00:45:32.670968 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.671028 kubelet[1998]: E0508 00:45:32.670975 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.676335 kubelet[1998]: E0508 00:45:32.676305 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.676471 kubelet[1998]: W0508 00:45:32.676329 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.676471 kubelet[1998]: E0508 00:45:32.676386 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.676723 kubelet[1998]: E0508 00:45:32.676704 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.676793 kubelet[1998]: W0508 00:45:32.676735 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.676793 kubelet[1998]: E0508 00:45:32.676762 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.677030 kubelet[1998]: E0508 00:45:32.677010 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.677104 kubelet[1998]: W0508 00:45:32.677045 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.677104 kubelet[1998]: E0508 00:45:32.677069 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.677309 kubelet[1998]: E0508 00:45:32.677292 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.677375 kubelet[1998]: W0508 00:45:32.677308 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.677375 kubelet[1998]: E0508 00:45:32.677332 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.677583 kubelet[1998]: E0508 00:45:32.677564 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.677653 kubelet[1998]: W0508 00:45:32.677581 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.677653 kubelet[1998]: E0508 00:45:32.677605 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.677881 kubelet[1998]: E0508 00:45:32.677849 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.677978 kubelet[1998]: W0508 00:45:32.677881 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.677978 kubelet[1998]: E0508 00:45:32.677899 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.678310 kubelet[1998]: E0508 00:45:32.678287 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.678310 kubelet[1998]: W0508 00:45:32.678304 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.678426 kubelet[1998]: E0508 00:45:32.678329 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.678669 kubelet[1998]: E0508 00:45:32.678650 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.678669 kubelet[1998]: W0508 00:45:32.678664 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.678785 kubelet[1998]: E0508 00:45:32.678679 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.678869 kubelet[1998]: E0508 00:45:32.678853 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.678869 kubelet[1998]: W0508 00:45:32.678866 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.679006 kubelet[1998]: E0508 00:45:32.678881 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.679102 kubelet[1998]: E0508 00:45:32.679087 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.679102 kubelet[1998]: W0508 00:45:32.679099 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.679208 kubelet[1998]: E0508 00:45:32.679112 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.679312 kubelet[1998]: E0508 00:45:32.679293 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.679312 kubelet[1998]: W0508 00:45:32.679307 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.679419 kubelet[1998]: E0508 00:45:32.679321 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.679509 kubelet[1998]: E0508 00:45:32.679495 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.679509 kubelet[1998]: W0508 00:45:32.679506 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.679662 kubelet[1998]: E0508 00:45:32.679521 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.679707 kubelet[1998]: E0508 00:45:32.679700 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.679707 kubelet[1998]: W0508 00:45:32.679708 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.679807 kubelet[1998]: E0508 00:45:32.679719 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.679977 kubelet[1998]: E0508 00:45:32.679958 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.679977 kubelet[1998]: W0508 00:45:32.679976 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.680106 kubelet[1998]: E0508 00:45:32.679990 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.680256 kubelet[1998]: E0508 00:45:32.680236 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.680256 kubelet[1998]: W0508 00:45:32.680250 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.680370 kubelet[1998]: E0508 00:45:32.680283 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.680500 kubelet[1998]: E0508 00:45:32.680480 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.680500 kubelet[1998]: W0508 00:45:32.680494 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.680586 kubelet[1998]: E0508 00:45:32.680508 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.680826 kubelet[1998]: E0508 00:45:32.680805 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.680826 kubelet[1998]: W0508 00:45:32.680819 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.680973 kubelet[1998]: E0508 00:45:32.680835 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:32.681058 kubelet[1998]: E0508 00:45:32.681043 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:32.681058 kubelet[1998]: W0508 00:45:32.681055 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:32.681159 kubelet[1998]: E0508 00:45:32.681065 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.613068 kubelet[1998]: I0508 00:45:33.613034 1998 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:45:33.613576 kubelet[1998]: E0508 00:45:33.613426 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:33.675016 kubelet[1998]: E0508 00:45:33.674951 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.675016 kubelet[1998]: W0508 00:45:33.674986 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.675016 kubelet[1998]: E0508 00:45:33.675016 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.675375 kubelet[1998]: E0508 00:45:33.675351 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.675375 kubelet[1998]: W0508 00:45:33.675365 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.675439 kubelet[1998]: E0508 00:45:33.675377 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.675583 kubelet[1998]: E0508 00:45:33.675551 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.675583 kubelet[1998]: W0508 00:45:33.675564 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.675583 kubelet[1998]: E0508 00:45:33.675576 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.675846 kubelet[1998]: E0508 00:45:33.675804 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.675846 kubelet[1998]: W0508 00:45:33.675830 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.675846 kubelet[1998]: E0508 00:45:33.675857 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.676113 kubelet[1998]: E0508 00:45:33.676099 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.676113 kubelet[1998]: W0508 00:45:33.676108 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.676164 kubelet[1998]: E0508 00:45:33.676116 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.676325 kubelet[1998]: E0508 00:45:33.676303 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.676325 kubelet[1998]: W0508 00:45:33.676317 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.676425 kubelet[1998]: E0508 00:45:33.676328 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.676506 kubelet[1998]: E0508 00:45:33.676491 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.676506 kubelet[1998]: W0508 00:45:33.676501 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.676561 kubelet[1998]: E0508 00:45:33.676510 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.676695 kubelet[1998]: E0508 00:45:33.676674 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.676695 kubelet[1998]: W0508 00:45:33.676687 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.676695 kubelet[1998]: E0508 00:45:33.676694 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.676878 kubelet[1998]: E0508 00:45:33.676862 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.676878 kubelet[1998]: W0508 00:45:33.676872 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.676878 kubelet[1998]: E0508 00:45:33.676879 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.677047 kubelet[1998]: E0508 00:45:33.677033 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.677047 kubelet[1998]: W0508 00:45:33.677044 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.677112 kubelet[1998]: E0508 00:45:33.677053 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.677226 kubelet[1998]: E0508 00:45:33.677208 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.677226 kubelet[1998]: W0508 00:45:33.677219 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.677346 kubelet[1998]: E0508 00:45:33.677236 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.677426 kubelet[1998]: E0508 00:45:33.677406 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.677426 kubelet[1998]: W0508 00:45:33.677421 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.677541 kubelet[1998]: E0508 00:45:33.677433 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.677675 kubelet[1998]: E0508 00:45:33.677649 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.677675 kubelet[1998]: W0508 00:45:33.677663 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.677675 kubelet[1998]: E0508 00:45:33.677677 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.677894 kubelet[1998]: E0508 00:45:33.677877 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.677894 kubelet[1998]: W0508 00:45:33.677888 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.677894 kubelet[1998]: E0508 00:45:33.677896 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.678072 kubelet[1998]: E0508 00:45:33.678053 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.678072 kubelet[1998]: W0508 00:45:33.678063 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.678072 kubelet[1998]: E0508 00:45:33.678070 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.685474 kubelet[1998]: E0508 00:45:33.685450 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.685474 kubelet[1998]: W0508 00:45:33.685468 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.685574 kubelet[1998]: E0508 00:45:33.685482 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.685739 kubelet[1998]: E0508 00:45:33.685718 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.685739 kubelet[1998]: W0508 00:45:33.685734 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.685826 kubelet[1998]: E0508 00:45:33.685751 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.685960 kubelet[1998]: E0508 00:45:33.685942 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.685960 kubelet[1998]: W0508 00:45:33.685956 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.686050 kubelet[1998]: E0508 00:45:33.685970 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.686141 kubelet[1998]: E0508 00:45:33.686124 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.686141 kubelet[1998]: W0508 00:45:33.686135 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.686211 kubelet[1998]: E0508 00:45:33.686148 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.686346 kubelet[1998]: E0508 00:45:33.686331 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.686346 kubelet[1998]: W0508 00:45:33.686342 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.686421 kubelet[1998]: E0508 00:45:33.686355 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.686570 kubelet[1998]: E0508 00:45:33.686544 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.686570 kubelet[1998]: W0508 00:45:33.686557 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.686570 kubelet[1998]: E0508 00:45:33.686568 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.686783 kubelet[1998]: E0508 00:45:33.686764 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.686783 kubelet[1998]: W0508 00:45:33.686780 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.686852 kubelet[1998]: E0508 00:45:33.686796 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.687035 kubelet[1998]: E0508 00:45:33.687016 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.687035 kubelet[1998]: W0508 00:45:33.687031 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.687129 kubelet[1998]: E0508 00:45:33.687055 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.687201 kubelet[1998]: E0508 00:45:33.687183 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.687201 kubelet[1998]: W0508 00:45:33.687197 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.687266 kubelet[1998]: E0508 00:45:33.687221 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.687372 kubelet[1998]: E0508 00:45:33.687352 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.687372 kubelet[1998]: W0508 00:45:33.687367 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.687437 kubelet[1998]: E0508 00:45:33.687384 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.687558 kubelet[1998]: E0508 00:45:33.687539 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.687558 kubelet[1998]: W0508 00:45:33.687553 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.687644 kubelet[1998]: E0508 00:45:33.687568 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.687785 kubelet[1998]: E0508 00:45:33.687767 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.687785 kubelet[1998]: W0508 00:45:33.687782 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.687840 kubelet[1998]: E0508 00:45:33.687797 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.687994 kubelet[1998]: E0508 00:45:33.687980 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.688037 kubelet[1998]: W0508 00:45:33.687993 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.688037 kubelet[1998]: E0508 00:45:33.688008 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.688257 kubelet[1998]: E0508 00:45:33.688233 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.688257 kubelet[1998]: W0508 00:45:33.688253 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.688328 kubelet[1998]: E0508 00:45:33.688263 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.688426 kubelet[1998]: E0508 00:45:33.688408 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.688426 kubelet[1998]: W0508 00:45:33.688425 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.688488 kubelet[1998]: E0508 00:45:33.688440 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.688632 kubelet[1998]: E0508 00:45:33.688617 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.688661 kubelet[1998]: W0508 00:45:33.688631 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.688661 kubelet[1998]: E0508 00:45:33.688642 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.688865 kubelet[1998]: E0508 00:45:33.688849 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.688865 kubelet[1998]: W0508 00:45:33.688863 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.688934 kubelet[1998]: E0508 00:45:33.688874 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:33.689259 kubelet[1998]: E0508 00:45:33.689228 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:33.689259 kubelet[1998]: W0508 00:45:33.689251 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:33.689334 kubelet[1998]: E0508 00:45:33.689262 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:34.553934 kubelet[1998]: E0508 00:45:34.553867 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:35.084118 kubelet[1998]: I0508 00:45:35.084067 1998 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:45:35.084550 kubelet[1998]: E0508 00:45:35.084521 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:35.185513 kubelet[1998]: E0508 00:45:35.185443 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.185513 kubelet[1998]: W0508 00:45:35.185485 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.185513 kubelet[1998]: E0508 00:45:35.185519 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.185901 kubelet[1998]: E0508 00:45:35.185879 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.185901 kubelet[1998]: W0508 00:45:35.185896 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.186022 kubelet[1998]: E0508 00:45:35.185935 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.186160 kubelet[1998]: E0508 00:45:35.186140 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.186160 kubelet[1998]: W0508 00:45:35.186155 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.186242 kubelet[1998]: E0508 00:45:35.186168 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.186395 kubelet[1998]: E0508 00:45:35.186375 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.186395 kubelet[1998]: W0508 00:45:35.186390 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.186497 kubelet[1998]: E0508 00:45:35.186402 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.186659 kubelet[1998]: E0508 00:45:35.186638 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.186659 kubelet[1998]: W0508 00:45:35.186654 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.186741 kubelet[1998]: E0508 00:45:35.186666 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.186875 kubelet[1998]: E0508 00:45:35.186858 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.186936 kubelet[1998]: W0508 00:45:35.186876 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.186936 kubelet[1998]: E0508 00:45:35.186893 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.187193 kubelet[1998]: E0508 00:45:35.187177 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.187193 kubelet[1998]: W0508 00:45:35.187192 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.187269 kubelet[1998]: E0508 00:45:35.187204 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.187442 kubelet[1998]: E0508 00:45:35.187414 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.187442 kubelet[1998]: W0508 00:45:35.187440 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.187510 kubelet[1998]: E0508 00:45:35.187452 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.187694 kubelet[1998]: E0508 00:45:35.187676 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.187694 kubelet[1998]: W0508 00:45:35.187691 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.187769 kubelet[1998]: E0508 00:45:35.187702 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.187933 kubelet[1998]: E0508 00:45:35.187898 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.187933 kubelet[1998]: W0508 00:45:35.187932 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.188000 kubelet[1998]: E0508 00:45:35.187959 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.188169 kubelet[1998]: E0508 00:45:35.188150 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.188169 kubelet[1998]: W0508 00:45:35.188165 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.188272 kubelet[1998]: E0508 00:45:35.188176 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.188378 kubelet[1998]: E0508 00:45:35.188361 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.188378 kubelet[1998]: W0508 00:45:35.188376 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.188453 kubelet[1998]: E0508 00:45:35.188387 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.188642 kubelet[1998]: E0508 00:45:35.188625 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.188673 kubelet[1998]: W0508 00:45:35.188640 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.188673 kubelet[1998]: E0508 00:45:35.188654 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.188883 kubelet[1998]: E0508 00:45:35.188866 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.188883 kubelet[1998]: W0508 00:45:35.188881 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.188967 kubelet[1998]: E0508 00:45:35.188892 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.189127 kubelet[1998]: E0508 00:45:35.189110 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.189127 kubelet[1998]: W0508 00:45:35.189125 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.189188 kubelet[1998]: E0508 00:45:35.189136 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.198738 kubelet[1998]: E0508 00:45:35.198690 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.198738 kubelet[1998]: W0508 00:45:35.198723 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.198738 kubelet[1998]: E0508 00:45:35.198749 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.199127 kubelet[1998]: E0508 00:45:35.199080 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.199164 kubelet[1998]: W0508 00:45:35.199125 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.199190 kubelet[1998]: E0508 00:45:35.199159 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.199592 kubelet[1998]: E0508 00:45:35.199559 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.199592 kubelet[1998]: W0508 00:45:35.199574 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.199592 kubelet[1998]: E0508 00:45:35.199588 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.199925 kubelet[1998]: E0508 00:45:35.199862 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.199925 kubelet[1998]: W0508 00:45:35.199875 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.199925 kubelet[1998]: E0508 00:45:35.199889 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.200245 kubelet[1998]: E0508 00:45:35.200097 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.200245 kubelet[1998]: W0508 00:45:35.200105 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.200245 kubelet[1998]: E0508 00:45:35.200150 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.200363 kubelet[1998]: E0508 00:45:35.200285 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.200363 kubelet[1998]: W0508 00:45:35.200294 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.200363 kubelet[1998]: E0508 00:45:35.200319 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.200570 kubelet[1998]: E0508 00:45:35.200538 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.200570 kubelet[1998]: W0508 00:45:35.200558 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.200657 kubelet[1998]: E0508 00:45:35.200588 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.200772 kubelet[1998]: E0508 00:45:35.200755 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.200772 kubelet[1998]: W0508 00:45:35.200769 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.200872 kubelet[1998]: E0508 00:45:35.200786 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.201205 kubelet[1998]: E0508 00:45:35.201099 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.201205 kubelet[1998]: W0508 00:45:35.201121 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.201205 kubelet[1998]: E0508 00:45:35.201141 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.201531 kubelet[1998]: E0508 00:45:35.201475 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.201531 kubelet[1998]: W0508 00:45:35.201488 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.201531 kubelet[1998]: E0508 00:45:35.201508 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.201768 kubelet[1998]: E0508 00:45:35.201750 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.201768 kubelet[1998]: W0508 00:45:35.201766 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.201826 kubelet[1998]: E0508 00:45:35.201784 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.202037 kubelet[1998]: E0508 00:45:35.202018 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.202037 kubelet[1998]: W0508 00:45:35.202036 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.202107 kubelet[1998]: E0508 00:45:35.202053 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.202266 kubelet[1998]: E0508 00:45:35.202250 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.202266 kubelet[1998]: W0508 00:45:35.202264 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.202329 kubelet[1998]: E0508 00:45:35.202279 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.202463 kubelet[1998]: E0508 00:45:35.202444 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.202463 kubelet[1998]: W0508 00:45:35.202457 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.202563 kubelet[1998]: E0508 00:45:35.202469 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.202677 kubelet[1998]: E0508 00:45:35.202662 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.202677 kubelet[1998]: W0508 00:45:35.202672 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.202755 kubelet[1998]: E0508 00:45:35.202683 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.202995 kubelet[1998]: E0508 00:45:35.202978 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.202995 kubelet[1998]: W0508 00:45:35.202992 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.203079 kubelet[1998]: E0508 00:45:35.203005 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.203249 kubelet[1998]: E0508 00:45:35.203233 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.203249 kubelet[1998]: W0508 00:45:35.203246 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.203307 kubelet[1998]: E0508 00:45:35.203254 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.203416 kubelet[1998]: E0508 00:45:35.203401 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.203416 kubelet[1998]: W0508 00:45:35.203413 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.203498 kubelet[1998]: E0508 00:45:35.203422 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.243730 kubelet[1998]: I0508 00:45:35.243284 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-74c787cbdb-gw7zs" podStartSLOduration=4.255802887 podStartE2EDuration="8.24326172s" podCreationTimestamp="2025-05-08 00:45:27 +0000 UTC" firstStartedPulling="2025-05-08 00:45:27.683239584 +0000 UTC m=+15.243099884" lastFinishedPulling="2025-05-08 00:45:31.670698417 +0000 UTC m=+19.230558717" observedRunningTime="2025-05-08 00:45:32.757497525 +0000 UTC m=+20.317357835" watchObservedRunningTime="2025-05-08 00:45:35.24326172 +0000 UTC m=+22.803122020" May 8 00:45:35.403000 audit[2612]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:45:35.403000 audit[2612]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc596b16c0 a2=0 a3=7ffc596b16ac items=0 ppid=2184 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:35.403000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:35.410000 audit[2612]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:45:35.410000 audit[2612]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc596b16c0 a2=0 a3=7ffc596b16ac items=0 ppid=2184 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:35.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:45:35.617432 kubelet[1998]: E0508 00:45:35.617384 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:35.692710 kubelet[1998]: E0508 00:45:35.692570 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.692710 kubelet[1998]: W0508 00:45:35.692595 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.692710 kubelet[1998]: E0508 00:45:35.692620 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.692944 kubelet[1998]: E0508 00:45:35.692833 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.692944 kubelet[1998]: W0508 00:45:35.692858 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.692944 kubelet[1998]: E0508 00:45:35.692871 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.693109 kubelet[1998]: E0508 00:45:35.693092 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.693109 kubelet[1998]: W0508 00:45:35.693106 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.693233 kubelet[1998]: E0508 00:45:35.693122 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.693340 kubelet[1998]: E0508 00:45:35.693315 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.693340 kubelet[1998]: W0508 00:45:35.693329 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.693434 kubelet[1998]: E0508 00:45:35.693341 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.693566 kubelet[1998]: E0508 00:45:35.693546 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.693566 kubelet[1998]: W0508 00:45:35.693564 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.693680 kubelet[1998]: E0508 00:45:35.693580 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.693776 kubelet[1998]: E0508 00:45:35.693751 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.693776 kubelet[1998]: W0508 00:45:35.693772 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.693870 kubelet[1998]: E0508 00:45:35.693783 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.693961 kubelet[1998]: E0508 00:45:35.693946 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.693961 kubelet[1998]: W0508 00:45:35.693958 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.694069 kubelet[1998]: E0508 00:45:35.693968 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.694178 kubelet[1998]: E0508 00:45:35.694152 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.694178 kubelet[1998]: W0508 00:45:35.694175 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.694275 kubelet[1998]: E0508 00:45:35.694186 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.694396 kubelet[1998]: E0508 00:45:35.694373 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.694396 kubelet[1998]: W0508 00:45:35.694385 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.694396 kubelet[1998]: E0508 00:45:35.694396 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.694583 kubelet[1998]: E0508 00:45:35.694568 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.694583 kubelet[1998]: W0508 00:45:35.694580 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.694658 kubelet[1998]: E0508 00:45:35.694591 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.694780 kubelet[1998]: E0508 00:45:35.694765 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.694780 kubelet[1998]: W0508 00:45:35.694778 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.694856 kubelet[1998]: E0508 00:45:35.694788 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.694990 kubelet[1998]: E0508 00:45:35.694971 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.694990 kubelet[1998]: W0508 00:45:35.694985 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.695050 kubelet[1998]: E0508 00:45:35.694994 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.695180 kubelet[1998]: E0508 00:45:35.695157 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.695180 kubelet[1998]: W0508 00:45:35.695174 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.695236 kubelet[1998]: E0508 00:45:35.695182 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.695367 kubelet[1998]: E0508 00:45:35.695352 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.695415 kubelet[1998]: W0508 00:45:35.695371 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.695415 kubelet[1998]: E0508 00:45:35.695380 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.695561 kubelet[1998]: E0508 00:45:35.695546 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.695561 kubelet[1998]: W0508 00:45:35.695558 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.695644 kubelet[1998]: E0508 00:45:35.695567 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.702874 kubelet[1998]: E0508 00:45:35.702839 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.702874 kubelet[1998]: W0508 00:45:35.702859 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.702874 kubelet[1998]: E0508 00:45:35.702870 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.703110 kubelet[1998]: E0508 00:45:35.703088 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.703110 kubelet[1998]: W0508 00:45:35.703101 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.703180 kubelet[1998]: E0508 00:45:35.703116 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.703348 kubelet[1998]: E0508 00:45:35.703329 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.703348 kubelet[1998]: W0508 00:45:35.703342 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.703434 kubelet[1998]: E0508 00:45:35.703355 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.703539 kubelet[1998]: E0508 00:45:35.703523 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.703539 kubelet[1998]: W0508 00:45:35.703536 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.703632 kubelet[1998]: E0508 00:45:35.703549 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.703712 kubelet[1998]: E0508 00:45:35.703698 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.703712 kubelet[1998]: W0508 00:45:35.703711 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.703771 kubelet[1998]: E0508 00:45:35.703723 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.703950 kubelet[1998]: E0508 00:45:35.703893 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.703950 kubelet[1998]: W0508 00:45:35.703932 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.704061 kubelet[1998]: E0508 00:45:35.703955 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.704174 kubelet[1998]: E0508 00:45:35.704158 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.704174 kubelet[1998]: W0508 00:45:35.704170 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.704254 kubelet[1998]: E0508 00:45:35.704199 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.704356 kubelet[1998]: E0508 00:45:35.704340 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.704356 kubelet[1998]: W0508 00:45:35.704352 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.704454 kubelet[1998]: E0508 00:45:35.704381 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.704554 kubelet[1998]: E0508 00:45:35.704534 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.704554 kubelet[1998]: W0508 00:45:35.704547 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.704649 kubelet[1998]: E0508 00:45:35.704572 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.704777 kubelet[1998]: E0508 00:45:35.704760 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.704777 kubelet[1998]: W0508 00:45:35.704772 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.704872 kubelet[1998]: E0508 00:45:35.704787 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.705003 kubelet[1998]: E0508 00:45:35.704985 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.705003 kubelet[1998]: W0508 00:45:35.704999 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.705100 kubelet[1998]: E0508 00:45:35.705016 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.705234 kubelet[1998]: E0508 00:45:35.705218 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.705234 kubelet[1998]: W0508 00:45:35.705229 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.705329 kubelet[1998]: E0508 00:45:35.705244 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.707935 kubelet[1998]: E0508 00:45:35.705782 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.707935 kubelet[1998]: W0508 00:45:35.705798 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.707935 kubelet[1998]: E0508 00:45:35.705811 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.707935 kubelet[1998]: E0508 00:45:35.706000 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.707935 kubelet[1998]: W0508 00:45:35.706010 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.707935 kubelet[1998]: E0508 00:45:35.706020 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.707935 kubelet[1998]: E0508 00:45:35.706157 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.707935 kubelet[1998]: W0508 00:45:35.706165 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.707935 kubelet[1998]: E0508 00:45:35.706175 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.708712 kubelet[1998]: E0508 00:45:35.708687 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.708712 kubelet[1998]: W0508 00:45:35.708707 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.708819 kubelet[1998]: E0508 00:45:35.708732 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.709055 kubelet[1998]: E0508 00:45:35.709038 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.709055 kubelet[1998]: W0508 00:45:35.709054 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.709158 kubelet[1998]: E0508 00:45:35.709070 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.709285 kubelet[1998]: E0508 00:45:35.709269 1998 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:45:35.709285 kubelet[1998]: W0508 00:45:35.709281 1998 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:45:35.709374 kubelet[1998]: E0508 00:45:35.709291 1998 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:45:35.877270 env[1227]: time="2025-05-08T00:45:35.877182637Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:35.884335 env[1227]: time="2025-05-08T00:45:35.884176572Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:35.886040 env[1227]: time="2025-05-08T00:45:35.886002479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:35.887872 env[1227]: time="2025-05-08T00:45:35.887834078Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:35.888382 env[1227]: time="2025-05-08T00:45:35.888333227Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 8 00:45:35.891432 env[1227]: time="2025-05-08T00:45:35.891216148Z" level=info msg="CreateContainer within sandbox \"d5d7cb749676642ceec43a8b288822c52e1e91d93f1efcd997039dac6c3ce84e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 8 00:45:35.921884 env[1227]: time="2025-05-08T00:45:35.921809502Z" level=info msg="CreateContainer within sandbox \"d5d7cb749676642ceec43a8b288822c52e1e91d93f1efcd997039dac6c3ce84e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"83a27ea16a11af42c1207fcedf227b4aafe1a3020bf70c792389e5d0b729b8d9\"" May 8 00:45:35.922616 env[1227]: time="2025-05-08T00:45:35.922589087Z" level=info msg="StartContainer for \"83a27ea16a11af42c1207fcedf227b4aafe1a3020bf70c792389e5d0b729b8d9\"" May 8 00:45:35.961533 systemd[1]: Started cri-containerd-83a27ea16a11af42c1207fcedf227b4aafe1a3020bf70c792389e5d0b729b8d9.scope. May 8 00:45:35.976000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.976000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd454688218 items=0 ppid=2433 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:35.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833613237656131366131316166343263313230376663656466323237 May 8 00:45:35.976000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.976000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.976000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.976000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.976000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.976000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.976000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.976000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.976000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.976000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.976000 audit: BPF prog-id=130 op=LOAD May 8 00:45:35.976000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003c0078 items=0 ppid=2433 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:35.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833613237656131366131316166343263313230376663656466323237 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit: BPF prog-id=131 op=LOAD May 8 00:45:35.977000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003c00c8 items=0 ppid=2433 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:35.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833613237656131366131316166343263313230376663656466323237 May 8 00:45:35.977000 audit: BPF prog-id=131 op=UNLOAD May 8 00:45:35.977000 audit: BPF prog-id=130 op=UNLOAD May 8 00:45:35.977000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:35.977000 audit: BPF prog-id=132 op=LOAD May 8 00:45:35.977000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c0158 items=0 ppid=2433 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:35.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833613237656131366131316166343263313230376663656466323237 May 8 00:45:36.007508 systemd[1]: cri-containerd-83a27ea16a11af42c1207fcedf227b4aafe1a3020bf70c792389e5d0b729b8d9.scope: Deactivated successfully. May 8 00:45:36.012000 audit: BPF prog-id=132 op=UNLOAD May 8 00:45:36.192956 env[1227]: time="2025-05-08T00:45:36.192751889Z" level=info msg="StartContainer for \"83a27ea16a11af42c1207fcedf227b4aafe1a3020bf70c792389e5d0b729b8d9\" returns successfully" May 8 00:45:36.213527 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-83a27ea16a11af42c1207fcedf227b4aafe1a3020bf70c792389e5d0b729b8d9-rootfs.mount: Deactivated successfully. May 8 00:45:36.220181 env[1227]: time="2025-05-08T00:45:36.220107336Z" level=info msg="shim disconnected" id=83a27ea16a11af42c1207fcedf227b4aafe1a3020bf70c792389e5d0b729b8d9 May 8 00:45:36.220181 env[1227]: time="2025-05-08T00:45:36.220168409Z" level=warning msg="cleaning up after shim disconnected" id=83a27ea16a11af42c1207fcedf227b4aafe1a3020bf70c792389e5d0b729b8d9 namespace=k8s.io May 8 00:45:36.220181 env[1227]: time="2025-05-08T00:45:36.220182378Z" level=info msg="cleaning up dead shim" May 8 00:45:36.228944 env[1227]: time="2025-05-08T00:45:36.228817252Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:45:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2690 runtime=io.containerd.runc.v2\n" May 8 00:45:36.556956 kubelet[1998]: E0508 00:45:36.556879 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:36.621248 kubelet[1998]: E0508 00:45:36.621194 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:36.622225 env[1227]: time="2025-05-08T00:45:36.622167628Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 8 00:45:38.554536 kubelet[1998]: E0508 00:45:38.554461 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:40.557646 kubelet[1998]: E0508 00:45:40.557578 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:42.554621 kubelet[1998]: E0508 00:45:42.554536 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:44.554656 kubelet[1998]: E0508 00:45:44.554603 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:45.867153 env[1227]: time="2025-05-08T00:45:45.867061149Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:45.870513 env[1227]: time="2025-05-08T00:45:45.870461865Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:45.872774 env[1227]: time="2025-05-08T00:45:45.872725659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:45.874594 env[1227]: time="2025-05-08T00:45:45.874559677Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:45:45.875068 env[1227]: time="2025-05-08T00:45:45.875041867Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 8 00:45:45.877270 env[1227]: time="2025-05-08T00:45:45.877232204Z" level=info msg="CreateContainer within sandbox \"d5d7cb749676642ceec43a8b288822c52e1e91d93f1efcd997039dac6c3ce84e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 8 00:45:45.891950 env[1227]: time="2025-05-08T00:45:45.891870717Z" level=info msg="CreateContainer within sandbox \"d5d7cb749676642ceec43a8b288822c52e1e91d93f1efcd997039dac6c3ce84e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"af175d918e8d3823b4ff653d964b717dd73e0e1cecf5573c0f54e52db7138bfb\"" May 8 00:45:45.892569 env[1227]: time="2025-05-08T00:45:45.892525680Z" level=info msg="StartContainer for \"af175d918e8d3823b4ff653d964b717dd73e0e1cecf5573c0f54e52db7138bfb\"" May 8 00:45:45.914265 systemd[1]: run-containerd-runc-k8s.io-af175d918e8d3823b4ff653d964b717dd73e0e1cecf5573c0f54e52db7138bfb-runc.XbYNZp.mount: Deactivated successfully. May 8 00:45:45.918079 systemd[1]: Started cri-containerd-af175d918e8d3823b4ff653d964b717dd73e0e1cecf5573c0f54e52db7138bfb.scope. May 8 00:45:45.931000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.938652 kernel: kauditd_printk_skb: 97 callbacks suppressed May 8 00:45:45.938746 kernel: audit: type=1400 audit(1746665145.931:988): avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.938794 kernel: audit: type=1300 audit(1746665145.931:988): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f24e4403a08 items=0 ppid=2433 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:45.931000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f24e4403a08 items=0 ppid=2433 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:45.944576 kernel: audit: type=1327 audit(1746665145.931:988): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313735643931386538643338323362346666363533643936346237 May 8 00:45:45.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313735643931386538643338323362346666363533643936346237 May 8 00:45:45.949263 kernel: audit: type=1400 audit(1746665145.932:989): avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.932000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.952479 kernel: audit: type=1400 audit(1746665145.932:989): avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.932000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.955738 kernel: audit: type=1400 audit(1746665145.932:989): avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.932000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.932000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.962537 kernel: audit: type=1400 audit(1746665145.932:989): avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.962602 kernel: audit: type=1400 audit(1746665145.932:989): avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.932000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.932000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.969085 kernel: audit: type=1400 audit(1746665145.932:989): avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.969178 kernel: audit: type=1400 audit(1746665145.932:989): avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.932000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.932000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.932000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.932000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.932000 audit: BPF prog-id=133 op=LOAD May 8 00:45:45.932000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002f8658 items=0 ppid=2433 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:45.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313735643931386538643338323362346666363533643936346237 May 8 00:45:45.948000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.948000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.948000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.948000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.948000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.948000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.948000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.948000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.948000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.948000 audit: BPF prog-id=134 op=LOAD May 8 00:45:45.948000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002f86a8 items=0 ppid=2433 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:45.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313735643931386538643338323362346666363533643936346237 May 8 00:45:45.951000 audit: BPF prog-id=134 op=UNLOAD May 8 00:45:45.951000 audit: BPF prog-id=133 op=UNLOAD May 8 00:45:45.951000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.951000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.951000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.951000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.951000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.951000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.951000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.951000 audit[2715]: AVC avc: denied { perfmon } for pid=2715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.951000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.951000 audit[2715]: AVC avc: denied { bpf } for pid=2715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:45:45.951000 audit: BPF prog-id=135 op=LOAD May 8 00:45:45.951000 audit[2715]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002f8738 items=0 ppid=2433 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:45.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313735643931386538643338323362346666363533643936346237 May 8 00:45:45.988298 env[1227]: time="2025-05-08T00:45:45.988219071Z" level=info msg="StartContainer for \"af175d918e8d3823b4ff653d964b717dd73e0e1cecf5573c0f54e52db7138bfb\" returns successfully" May 8 00:45:46.554930 kubelet[1998]: E0508 00:45:46.554849 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:46.642592 kubelet[1998]: E0508 00:45:46.642512 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:47.644488 kubelet[1998]: E0508 00:45:47.644432 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:48.554486 kubelet[1998]: E0508 00:45:48.554415 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:48.599540 systemd[1]: cri-containerd-af175d918e8d3823b4ff653d964b717dd73e0e1cecf5573c0f54e52db7138bfb.scope: Deactivated successfully. May 8 00:45:48.603000 audit: BPF prog-id=135 op=UNLOAD May 8 00:45:48.617315 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-af175d918e8d3823b4ff653d964b717dd73e0e1cecf5573c0f54e52db7138bfb-rootfs.mount: Deactivated successfully. May 8 00:45:48.686670 kubelet[1998]: I0508 00:45:48.686615 1998 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 8 00:45:48.997227 kubelet[1998]: I0508 00:45:48.996640 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ttvj2\" (UniqueName: \"kubernetes.io/projected/80eac387-a1f3-4b89-9165-df3b545c65fa-kube-api-access-ttvj2\") pod \"coredns-668d6bf9bc-l5n8x\" (UID: \"80eac387-a1f3-4b89-9165-df3b545c65fa\") " pod="kube-system/coredns-668d6bf9bc-l5n8x" May 8 00:45:48.997227 kubelet[1998]: I0508 00:45:48.996703 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/80eac387-a1f3-4b89-9165-df3b545c65fa-config-volume\") pod \"coredns-668d6bf9bc-l5n8x\" (UID: \"80eac387-a1f3-4b89-9165-df3b545c65fa\") " pod="kube-system/coredns-668d6bf9bc-l5n8x" May 8 00:45:48.997227 kubelet[1998]: I0508 00:45:48.996730 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04-config-volume\") pod \"coredns-668d6bf9bc-7cskf\" (UID: \"f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04\") " pod="kube-system/coredns-668d6bf9bc-7cskf" May 8 00:45:49.372252 kubelet[1998]: I0508 00:45:49.369720 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zkzv2\" (UniqueName: \"kubernetes.io/projected/f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04-kube-api-access-zkzv2\") pod \"coredns-668d6bf9bc-7cskf\" (UID: \"f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04\") " pod="kube-system/coredns-668d6bf9bc-7cskf" May 8 00:45:49.378115 systemd[1]: Created slice kubepods-burstable-pod80eac387_a1f3_4b89_9165_df3b545c65fa.slice. May 8 00:45:49.384456 systemd[1]: Created slice kubepods-burstable-podf6baf2e2_60ef_4cbb_93ce_02c4a51ebc04.slice. May 8 00:45:49.395640 systemd[1]: Created slice kubepods-besteffort-podf97b153d_d30a_43c9_b786_d21b1909919c.slice. May 8 00:45:49.473546 kubelet[1998]: I0508 00:45:49.473482 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f97b153d-d30a-43c9-b786-d21b1909919c-tigera-ca-bundle\") pod \"calico-kube-controllers-fbfbbffdd-bhff9\" (UID: \"f97b153d-d30a-43c9-b786-d21b1909919c\") " pod="calico-system/calico-kube-controllers-fbfbbffdd-bhff9" May 8 00:45:49.473546 kubelet[1998]: I0508 00:45:49.473535 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5lkjg\" (UniqueName: \"kubernetes.io/projected/f97b153d-d30a-43c9-b786-d21b1909919c-kube-api-access-5lkjg\") pod \"calico-kube-controllers-fbfbbffdd-bhff9\" (UID: \"f97b153d-d30a-43c9-b786-d21b1909919c\") " pod="calico-system/calico-kube-controllers-fbfbbffdd-bhff9" May 8 00:45:49.561744 systemd[1]: Created slice kubepods-besteffort-pod467966ee_a4de_41f5_a742_c83abaf9be78.slice. May 8 00:45:49.576010 kubelet[1998]: I0508 00:45:49.574337 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/467966ee-a4de-41f5-a742-c83abaf9be78-calico-apiserver-certs\") pod \"calico-apiserver-66cc78549b-4fpbh\" (UID: \"467966ee-a4de-41f5-a742-c83abaf9be78\") " pod="calico-apiserver/calico-apiserver-66cc78549b-4fpbh" May 8 00:45:49.576010 kubelet[1998]: I0508 00:45:49.574386 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qvhss\" (UniqueName: \"kubernetes.io/projected/dcfdef5f-11b3-449f-a87e-841d4ef18553-kube-api-access-qvhss\") pod \"calico-apiserver-66cc78549b-xt5vk\" (UID: \"dcfdef5f-11b3-449f-a87e-841d4ef18553\") " pod="calico-apiserver/calico-apiserver-66cc78549b-xt5vk" May 8 00:45:49.576010 kubelet[1998]: I0508 00:45:49.574405 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c6d8k\" (UniqueName: \"kubernetes.io/projected/467966ee-a4de-41f5-a742-c83abaf9be78-kube-api-access-c6d8k\") pod \"calico-apiserver-66cc78549b-4fpbh\" (UID: \"467966ee-a4de-41f5-a742-c83abaf9be78\") " pod="calico-apiserver/calico-apiserver-66cc78549b-4fpbh" May 8 00:45:49.576010 kubelet[1998]: I0508 00:45:49.574422 1998 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/dcfdef5f-11b3-449f-a87e-841d4ef18553-calico-apiserver-certs\") pod \"calico-apiserver-66cc78549b-xt5vk\" (UID: \"dcfdef5f-11b3-449f-a87e-841d4ef18553\") " pod="calico-apiserver/calico-apiserver-66cc78549b-xt5vk" May 8 00:45:49.578838 systemd[1]: Created slice kubepods-besteffort-poddcfdef5f_11b3_449f_a87e_841d4ef18553.slice. May 8 00:45:49.681759 kubelet[1998]: E0508 00:45:49.681193 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:49.687359 kubelet[1998]: E0508 00:45:49.687329 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:49.695518 env[1227]: time="2025-05-08T00:45:49.695462157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-l5n8x,Uid:80eac387-a1f3-4b89-9165-df3b545c65fa,Namespace:kube-system,Attempt:0,}" May 8 00:45:49.695782 env[1227]: time="2025-05-08T00:45:49.695463609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-7cskf,Uid:f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04,Namespace:kube-system,Attempt:0,}" May 8 00:45:49.998490 env[1227]: time="2025-05-08T00:45:49.998345414Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-fbfbbffdd-bhff9,Uid:f97b153d-d30a-43c9-b786-d21b1909919c,Namespace:calico-system,Attempt:0,}" May 8 00:45:50.179728 env[1227]: time="2025-05-08T00:45:50.179665724Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66cc78549b-4fpbh,Uid:467966ee-a4de-41f5-a742-c83abaf9be78,Namespace:calico-apiserver,Attempt:0,}" May 8 00:45:50.182049 env[1227]: time="2025-05-08T00:45:50.182012161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66cc78549b-xt5vk,Uid:dcfdef5f-11b3-449f-a87e-841d4ef18553,Namespace:calico-apiserver,Attempt:0,}" May 8 00:45:50.798673 systemd[1]: Created slice kubepods-besteffort-pod72562622_3187_4bfb_96bf_cf9ba7859ac7.slice. May 8 00:45:50.801106 env[1227]: time="2025-05-08T00:45:50.801027535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-66j7s,Uid:72562622-3187-4bfb-96bf-cf9ba7859ac7,Namespace:calico-system,Attempt:0,}" May 8 00:45:50.990617 env[1227]: time="2025-05-08T00:45:50.990563100Z" level=info msg="shim disconnected" id=af175d918e8d3823b4ff653d964b717dd73e0e1cecf5573c0f54e52db7138bfb May 8 00:45:50.990617 env[1227]: time="2025-05-08T00:45:50.990614473Z" level=warning msg="cleaning up after shim disconnected" id=af175d918e8d3823b4ff653d964b717dd73e0e1cecf5573c0f54e52db7138bfb namespace=k8s.io May 8 00:45:50.990617 env[1227]: time="2025-05-08T00:45:50.990627849Z" level=info msg="cleaning up dead shim" May 8 00:45:51.000859 env[1227]: time="2025-05-08T00:45:51.000776847Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:45:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2766 runtime=io.containerd.runc.v2\n" May 8 00:45:51.653682 kubelet[1998]: E0508 00:45:51.653648 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:45:51.654391 env[1227]: time="2025-05-08T00:45:51.654353033Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 8 00:45:51.999390 env[1227]: time="2025-05-08T00:45:51.999040456Z" level=error msg="Failed to destroy network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.000276 env[1227]: time="2025-05-08T00:45:52.000237846Z" level=error msg="encountered an error cleaning up failed sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.000441 env[1227]: time="2025-05-08T00:45:52.000400367Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66cc78549b-xt5vk,Uid:dcfdef5f-11b3-449f-a87e-841d4ef18553,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.002197 kubelet[1998]: E0508 00:45:52.002145 1998 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.002305 kubelet[1998]: E0508 00:45:52.002238 1998 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66cc78549b-xt5vk" May 8 00:45:52.002305 kubelet[1998]: E0508 00:45:52.002264 1998 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66cc78549b-xt5vk" May 8 00:45:52.002411 kubelet[1998]: E0508 00:45:52.002313 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-66cc78549b-xt5vk_calico-apiserver(dcfdef5f-11b3-449f-a87e-841d4ef18553)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-66cc78549b-xt5vk_calico-apiserver(dcfdef5f-11b3-449f-a87e-841d4ef18553)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66cc78549b-xt5vk" podUID="dcfdef5f-11b3-449f-a87e-841d4ef18553" May 8 00:45:52.012308 env[1227]: time="2025-05-08T00:45:52.012208288Z" level=error msg="Failed to destroy network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.012757 env[1227]: time="2025-05-08T00:45:52.012711122Z" level=error msg="encountered an error cleaning up failed sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.012831 env[1227]: time="2025-05-08T00:45:52.012783895Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66cc78549b-4fpbh,Uid:467966ee-a4de-41f5-a742-c83abaf9be78,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.013114 kubelet[1998]: E0508 00:45:52.013064 1998 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.013228 kubelet[1998]: E0508 00:45:52.013147 1998 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66cc78549b-4fpbh" May 8 00:45:52.013228 kubelet[1998]: E0508 00:45:52.013179 1998 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66cc78549b-4fpbh" May 8 00:45:52.013356 kubelet[1998]: E0508 00:45:52.013236 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-66cc78549b-4fpbh_calico-apiserver(467966ee-a4de-41f5-a742-c83abaf9be78)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-66cc78549b-4fpbh_calico-apiserver(467966ee-a4de-41f5-a742-c83abaf9be78)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66cc78549b-4fpbh" podUID="467966ee-a4de-41f5-a742-c83abaf9be78" May 8 00:45:52.027764 env[1227]: time="2025-05-08T00:45:52.027675232Z" level=error msg="Failed to destroy network for sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.028223 env[1227]: time="2025-05-08T00:45:52.028162546Z" level=error msg="encountered an error cleaning up failed sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.028305 env[1227]: time="2025-05-08T00:45:52.028234558Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-l5n8x,Uid:80eac387-a1f3-4b89-9165-df3b545c65fa,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.028642 kubelet[1998]: E0508 00:45:52.028574 1998 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.028730 kubelet[1998]: E0508 00:45:52.028659 1998 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-l5n8x" May 8 00:45:52.028730 kubelet[1998]: E0508 00:45:52.028677 1998 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-l5n8x" May 8 00:45:52.028822 kubelet[1998]: E0508 00:45:52.028725 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-l5n8x_kube-system(80eac387-a1f3-4b89-9165-df3b545c65fa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-l5n8x_kube-system(80eac387-a1f3-4b89-9165-df3b545c65fa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-l5n8x" podUID="80eac387-a1f3-4b89-9165-df3b545c65fa" May 8 00:45:52.032518 env[1227]: time="2025-05-08T00:45:52.032453351Z" level=error msg="Failed to destroy network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.032890 env[1227]: time="2025-05-08T00:45:52.032843953Z" level=error msg="encountered an error cleaning up failed sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.033050 env[1227]: time="2025-05-08T00:45:52.033008167Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-7cskf,Uid:f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.033254 kubelet[1998]: E0508 00:45:52.033218 1998 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.033254 kubelet[1998]: E0508 00:45:52.033255 1998 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-7cskf" May 8 00:45:52.033476 kubelet[1998]: E0508 00:45:52.033274 1998 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-7cskf" May 8 00:45:52.033476 kubelet[1998]: E0508 00:45:52.033323 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-7cskf_kube-system(f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-7cskf_kube-system(f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-7cskf" podUID="f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04" May 8 00:45:52.034305 env[1227]: time="2025-05-08T00:45:52.034239403Z" level=error msg="Failed to destroy network for sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.034691 env[1227]: time="2025-05-08T00:45:52.034648983Z" level=error msg="encountered an error cleaning up failed sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.034751 env[1227]: time="2025-05-08T00:45:52.034704241Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-fbfbbffdd-bhff9,Uid:f97b153d-d30a-43c9-b786-d21b1909919c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.034972 kubelet[1998]: E0508 00:45:52.034929 1998 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.034972 kubelet[1998]: E0508 00:45:52.034962 1998 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-fbfbbffdd-bhff9" May 8 00:45:52.034972 kubelet[1998]: E0508 00:45:52.034976 1998 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-fbfbbffdd-bhff9" May 8 00:45:52.035223 kubelet[1998]: E0508 00:45:52.035006 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-fbfbbffdd-bhff9_calico-system(f97b153d-d30a-43c9-b786-d21b1909919c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-fbfbbffdd-bhff9_calico-system(f97b153d-d30a-43c9-b786-d21b1909919c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-fbfbbffdd-bhff9" podUID="f97b153d-d30a-43c9-b786-d21b1909919c" May 8 00:45:52.045080 env[1227]: time="2025-05-08T00:45:52.044986093Z" level=error msg="Failed to destroy network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.045519 env[1227]: time="2025-05-08T00:45:52.045446985Z" level=error msg="encountered an error cleaning up failed sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.045568 env[1227]: time="2025-05-08T00:45:52.045540991Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-66j7s,Uid:72562622-3187-4bfb-96bf-cf9ba7859ac7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.045813 kubelet[1998]: E0508 00:45:52.045756 1998 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.045813 kubelet[1998]: E0508 00:45:52.045817 1998 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-66j7s" May 8 00:45:52.046082 kubelet[1998]: E0508 00:45:52.045842 1998 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-66j7s" May 8 00:45:52.046082 kubelet[1998]: E0508 00:45:52.045889 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-66j7s_calico-system(72562622-3187-4bfb-96bf-cf9ba7859ac7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-66j7s_calico-system(72562622-3187-4bfb-96bf-cf9ba7859ac7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:52.656580 kubelet[1998]: I0508 00:45:52.656538 1998 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:45:52.658924 kubelet[1998]: I0508 00:45:52.658847 1998 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:45:52.659995 kubelet[1998]: I0508 00:45:52.659956 1998 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:45:52.660881 kubelet[1998]: I0508 00:45:52.660858 1998 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:45:52.662851 env[1227]: time="2025-05-08T00:45:52.662794081Z" level=info msg="StopPodSandbox for \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\"" May 8 00:45:52.665851 env[1227]: time="2025-05-08T00:45:52.663411933Z" level=info msg="StopPodSandbox for \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\"" May 8 00:45:52.665851 env[1227]: time="2025-05-08T00:45:52.663854508Z" level=info msg="StopPodSandbox for \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\"" May 8 00:45:52.666797 env[1227]: time="2025-05-08T00:45:52.666466062Z" level=info msg="StopPodSandbox for \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\"" May 8 00:45:52.666856 kubelet[1998]: I0508 00:45:52.666422 1998 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:45:52.667093 env[1227]: time="2025-05-08T00:45:52.667042282Z" level=info msg="StopPodSandbox for \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\"" May 8 00:45:52.668651 kubelet[1998]: I0508 00:45:52.668563 1998 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:45:52.669379 env[1227]: time="2025-05-08T00:45:52.669064000Z" level=info msg="StopPodSandbox for \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\"" May 8 00:45:52.724887 env[1227]: time="2025-05-08T00:45:52.724807759Z" level=error msg="StopPodSandbox for \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\" failed" error="failed to destroy network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.725203 kubelet[1998]: E0508 00:45:52.725131 1998 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:45:52.725288 kubelet[1998]: E0508 00:45:52.725232 1998 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa"} May 8 00:45:52.725334 kubelet[1998]: E0508 00:45:52.725309 1998 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"467966ee-a4de-41f5-a742-c83abaf9be78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:45:52.725419 kubelet[1998]: E0508 00:45:52.725337 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"467966ee-a4de-41f5-a742-c83abaf9be78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66cc78549b-4fpbh" podUID="467966ee-a4de-41f5-a742-c83abaf9be78" May 8 00:45:52.725526 env[1227]: time="2025-05-08T00:45:52.725454408Z" level=error msg="StopPodSandbox for \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\" failed" error="failed to destroy network for sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.725722 kubelet[1998]: E0508 00:45:52.725673 1998 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:45:52.725722 kubelet[1998]: E0508 00:45:52.725720 1998 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3"} May 8 00:45:52.725837 kubelet[1998]: E0508 00:45:52.725745 1998 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f97b153d-d30a-43c9-b786-d21b1909919c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:45:52.725837 kubelet[1998]: E0508 00:45:52.725776 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f97b153d-d30a-43c9-b786-d21b1909919c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-fbfbbffdd-bhff9" podUID="f97b153d-d30a-43c9-b786-d21b1909919c" May 8 00:45:52.729870 env[1227]: time="2025-05-08T00:45:52.729817395Z" level=error msg="StopPodSandbox for \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\" failed" error="failed to destroy network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.730084 kubelet[1998]: E0508 00:45:52.730026 1998 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:45:52.730145 kubelet[1998]: E0508 00:45:52.730087 1998 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd"} May 8 00:45:52.730145 kubelet[1998]: E0508 00:45:52.730127 1998 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dcfdef5f-11b3-449f-a87e-841d4ef18553\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:45:52.730223 kubelet[1998]: E0508 00:45:52.730148 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dcfdef5f-11b3-449f-a87e-841d4ef18553\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66cc78549b-xt5vk" podUID="dcfdef5f-11b3-449f-a87e-841d4ef18553" May 8 00:45:52.736059 env[1227]: time="2025-05-08T00:45:52.735991665Z" level=error msg="StopPodSandbox for \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\" failed" error="failed to destroy network for sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.736259 kubelet[1998]: E0508 00:45:52.736227 1998 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:45:52.736323 kubelet[1998]: E0508 00:45:52.736267 1998 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7"} May 8 00:45:52.736323 kubelet[1998]: E0508 00:45:52.736311 1998 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"80eac387-a1f3-4b89-9165-df3b545c65fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:45:52.736395 kubelet[1998]: E0508 00:45:52.736332 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"80eac387-a1f3-4b89-9165-df3b545c65fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-l5n8x" podUID="80eac387-a1f3-4b89-9165-df3b545c65fa" May 8 00:45:52.743124 env[1227]: time="2025-05-08T00:45:52.743060773Z" level=error msg="StopPodSandbox for \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\" failed" error="failed to destroy network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.743388 kubelet[1998]: E0508 00:45:52.743343 1998 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:45:52.743446 kubelet[1998]: E0508 00:45:52.743407 1998 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0"} May 8 00:45:52.743489 kubelet[1998]: E0508 00:45:52.743467 1998 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"72562622-3187-4bfb-96bf-cf9ba7859ac7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:45:52.743543 kubelet[1998]: E0508 00:45:52.743504 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"72562622-3187-4bfb-96bf-cf9ba7859ac7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:45:52.746445 env[1227]: time="2025-05-08T00:45:52.746370609Z" level=error msg="StopPodSandbox for \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\" failed" error="failed to destroy network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:45:52.746656 kubelet[1998]: E0508 00:45:52.746607 1998 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:45:52.746714 kubelet[1998]: E0508 00:45:52.746658 1998 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224"} May 8 00:45:52.746714 kubelet[1998]: E0508 00:45:52.746693 1998 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:45:52.746794 kubelet[1998]: E0508 00:45:52.746720 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-7cskf" podUID="f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04" May 8 00:45:52.838377 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0-shm.mount: Deactivated successfully. May 8 00:45:52.838478 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa-shm.mount: Deactivated successfully. May 8 00:45:52.838531 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3-shm.mount: Deactivated successfully. May 8 00:45:52.838585 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7-shm.mount: Deactivated successfully. May 8 00:45:52.838641 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224-shm.mount: Deactivated successfully. May 8 00:45:53.038746 systemd[1]: Started sshd@9-10.0.0.60:22-10.0.0.1:55476.service. May 8 00:45:53.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.60:22-10.0.0.1:55476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:53.040989 kernel: kauditd_printk_skb: 34 callbacks suppressed May 8 00:45:53.041150 kernel: audit: type=1130 audit(1746665153.037:995): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.60:22-10.0.0.1:55476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:53.082000 audit[3153]: USER_ACCT pid=3153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.083600 sshd[3153]: Accepted publickey for core from 10.0.0.1 port 55476 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:45:53.088954 kernel: audit: type=1101 audit(1746665153.082:996): pid=3153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.088000 audit[3153]: CRED_ACQ pid=3153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.091110 sshd[3153]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:45:53.095987 systemd-logind[1208]: New session 10 of user core. May 8 00:45:53.097023 systemd[1]: Started session-10.scope. May 8 00:45:53.098066 kernel: audit: type=1103 audit(1746665153.088:997): pid=3153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.098134 kernel: audit: type=1006 audit(1746665153.088:998): pid=3153 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 8 00:45:53.098160 kernel: audit: type=1300 audit(1746665153.088:998): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5ea2dec0 a2=3 a3=0 items=0 ppid=1 pid=3153 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:53.088000 audit[3153]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5ea2dec0 a2=3 a3=0 items=0 ppid=1 pid=3153 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:53.104626 kernel: audit: type=1327 audit(1746665153.088:998): proctitle=737368643A20636F7265205B707269765D May 8 00:45:53.088000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:45:53.102000 audit[3153]: USER_START pid=3153 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.111334 kernel: audit: type=1105 audit(1746665153.102:999): pid=3153 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.111413 kernel: audit: type=1103 audit(1746665153.103:1000): pid=3155 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.103000 audit[3155]: CRED_ACQ pid=3155 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.254377 sshd[3153]: pam_unix(sshd:session): session closed for user core May 8 00:45:53.254000 audit[3153]: USER_END pid=3153 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.257339 systemd[1]: sshd@9-10.0.0.60:22-10.0.0.1:55476.service: Deactivated successfully. May 8 00:45:53.258278 systemd[1]: session-10.scope: Deactivated successfully. May 8 00:45:53.258896 systemd-logind[1208]: Session 10 logged out. Waiting for processes to exit. May 8 00:45:53.259714 systemd-logind[1208]: Removed session 10. May 8 00:45:53.254000 audit[3153]: CRED_DISP pid=3153 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.270198 kernel: audit: type=1106 audit(1746665153.254:1001): pid=3153 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.270364 kernel: audit: type=1104 audit(1746665153.254:1002): pid=3153 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:53.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.60:22-10.0.0.1:55476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:58.264243 systemd[1]: Started sshd@10-10.0.0.60:22-10.0.0.1:48878.service. May 8 00:45:58.272487 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:45:58.272549 kernel: audit: type=1130 audit(1746665158.263:1004): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.60:22-10.0.0.1:48878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:58.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.60:22-10.0.0.1:48878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:45:58.306000 audit[3169]: USER_ACCT pid=3169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.307426 sshd[3169]: Accepted publickey for core from 10.0.0.1 port 48878 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:45:58.309813 sshd[3169]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:45:58.308000 audit[3169]: CRED_ACQ pid=3169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.316562 systemd-logind[1208]: New session 11 of user core. May 8 00:45:58.317576 systemd[1]: Started session-11.scope. May 8 00:45:58.318680 kernel: audit: type=1101 audit(1746665158.306:1005): pid=3169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.318774 kernel: audit: type=1103 audit(1746665158.308:1006): pid=3169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.318802 kernel: audit: type=1006 audit(1746665158.308:1007): pid=3169 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 8 00:45:58.308000 audit[3169]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2c3f6d0 a2=3 a3=0 items=0 ppid=1 pid=3169 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:58.329260 kernel: audit: type=1300 audit(1746665158.308:1007): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2c3f6d0 a2=3 a3=0 items=0 ppid=1 pid=3169 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:45:58.308000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:45:58.331332 kernel: audit: type=1327 audit(1746665158.308:1007): proctitle=737368643A20636F7265205B707269765D May 8 00:45:58.331387 kernel: audit: type=1105 audit(1746665158.324:1008): pid=3169 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.324000 audit[3169]: USER_START pid=3169 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.326000 audit[3171]: CRED_ACQ pid=3171 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.343227 kernel: audit: type=1103 audit(1746665158.326:1009): pid=3171 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.890086 sshd[3169]: pam_unix(sshd:session): session closed for user core May 8 00:45:58.890000 audit[3169]: USER_END pid=3169 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.892852 systemd[1]: sshd@10-10.0.0.60:22-10.0.0.1:48878.service: Deactivated successfully. May 8 00:45:58.893759 systemd[1]: session-11.scope: Deactivated successfully. May 8 00:45:58.894451 systemd-logind[1208]: Session 11 logged out. Waiting for processes to exit. May 8 00:45:58.895367 systemd-logind[1208]: Removed session 11. May 8 00:45:58.890000 audit[3169]: CRED_DISP pid=3169 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.902820 kernel: audit: type=1106 audit(1746665158.890:1010): pid=3169 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.903054 kernel: audit: type=1104 audit(1746665158.890:1011): pid=3169 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:45:58.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.60:22-10.0.0.1:48878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:02.969535 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount738768730.mount: Deactivated successfully. May 8 00:46:03.896421 systemd[1]: Started sshd@11-10.0.0.60:22-10.0.0.1:48886.service. May 8 00:46:03.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.60:22-10.0.0.1:48886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:03.897664 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:46:03.897755 kernel: audit: type=1130 audit(1746665163.895:1013): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.60:22-10.0.0.1:48886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:04.884565 env[1227]: time="2025-05-08T00:46:04.883468974Z" level=info msg="StopPodSandbox for \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\"" May 8 00:46:04.884565 env[1227]: time="2025-05-08T00:46:04.884411042Z" level=info msg="StopPodSandbox for \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\"" May 8 00:46:04.884565 env[1227]: time="2025-05-08T00:46:04.884441458Z" level=info msg="StopPodSandbox for \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\"" May 8 00:46:04.932658 env[1227]: time="2025-05-08T00:46:04.932570460Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:04.934000 audit[3183]: USER_ACCT pid=3183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:04.937318 sshd[3183]: Accepted publickey for core from 10.0.0.1 port 48886 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:04.947235 kernel: audit: type=1101 audit(1746665164.934:1014): pid=3183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:04.947429 kernel: audit: type=1103 audit(1746665164.939:1015): pid=3183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:04.947468 kernel: audit: type=1006 audit(1746665164.939:1016): pid=3183 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 8 00:46:04.939000 audit[3183]: CRED_ACQ pid=3183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:04.947015 systemd[1]: Started session-12.scope. May 8 00:46:04.941446 sshd[3183]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:04.939000 audit[3183]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc79766400 a2=3 a3=0 items=0 ppid=1 pid=3183 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:04.948689 systemd-logind[1208]: New session 12 of user core. May 8 00:46:04.959358 kernel: audit: type=1300 audit(1746665164.939:1016): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc79766400 a2=3 a3=0 items=0 ppid=1 pid=3183 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:04.959510 kernel: audit: type=1327 audit(1746665164.939:1016): proctitle=737368643A20636F7265205B707269765D May 8 00:46:04.959532 kernel: audit: type=1105 audit(1746665164.953:1017): pid=3183 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:04.939000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:04.953000 audit[3183]: USER_START pid=3183 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:04.959671 env[1227]: time="2025-05-08T00:46:04.957615134Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:04.959801 env[1227]: time="2025-05-08T00:46:04.959762475Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:04.954000 audit[3251]: CRED_ACQ pid=3251 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:04.965637 env[1227]: time="2025-05-08T00:46:04.965576814Z" level=error msg="StopPodSandbox for \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\" failed" error="failed to destroy network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:46:04.965867 kubelet[1998]: E0508 00:46:04.965819 1998 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:46:04.966214 kernel: audit: type=1103 audit(1746665164.954:1018): pid=3251 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:04.966244 kubelet[1998]: E0508 00:46:04.965880 1998 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224"} May 8 00:46:04.966244 kubelet[1998]: E0508 00:46:04.965972 1998 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:46:04.966244 kubelet[1998]: E0508 00:46:04.965997 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-7cskf" podUID="f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04" May 8 00:46:04.967216 env[1227]: time="2025-05-08T00:46:04.967184163Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:04.967674 env[1227]: time="2025-05-08T00:46:04.967638496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 8 00:46:04.969075 env[1227]: time="2025-05-08T00:46:04.969021524Z" level=error msg="StopPodSandbox for \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\" failed" error="failed to destroy network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:46:04.969220 kubelet[1998]: E0508 00:46:04.969159 1998 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:46:04.969220 kubelet[1998]: E0508 00:46:04.969205 1998 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd"} May 8 00:46:04.969300 kubelet[1998]: E0508 00:46:04.969230 1998 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dcfdef5f-11b3-449f-a87e-841d4ef18553\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:46:04.969300 kubelet[1998]: E0508 00:46:04.969248 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dcfdef5f-11b3-449f-a87e-841d4ef18553\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66cc78549b-xt5vk" podUID="dcfdef5f-11b3-449f-a87e-841d4ef18553" May 8 00:46:04.971877 env[1227]: time="2025-05-08T00:46:04.971824547Z" level=error msg="StopPodSandbox for \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\" failed" error="failed to destroy network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:46:04.972050 kubelet[1998]: E0508 00:46:04.972010 1998 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:46:04.972140 kubelet[1998]: E0508 00:46:04.972059 1998 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0"} May 8 00:46:04.972140 kubelet[1998]: E0508 00:46:04.972102 1998 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"72562622-3187-4bfb-96bf-cf9ba7859ac7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:46:04.972140 kubelet[1998]: E0508 00:46:04.972127 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"72562622-3187-4bfb-96bf-cf9ba7859ac7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-66j7s" podUID="72562622-3187-4bfb-96bf-cf9ba7859ac7" May 8 00:46:04.983507 env[1227]: time="2025-05-08T00:46:04.983448055Z" level=info msg="CreateContainer within sandbox \"d5d7cb749676642ceec43a8b288822c52e1e91d93f1efcd997039dac6c3ce84e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 8 00:46:05.126185 sshd[3183]: pam_unix(sshd:session): session closed for user core May 8 00:46:05.126897 env[1227]: time="2025-05-08T00:46:05.126795629Z" level=info msg="CreateContainer within sandbox \"d5d7cb749676642ceec43a8b288822c52e1e91d93f1efcd997039dac6c3ce84e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"16ab8882526fd8c92f7b8b412bdcd6b574b362dac22856510b40e564c0ae97cd\"" May 8 00:46:05.134703 kernel: audit: type=1106 audit(1746665165.126:1019): pid=3183 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:05.126000 audit[3183]: USER_END pid=3183 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:05.133475 systemd[1]: sshd@11-10.0.0.60:22-10.0.0.1:48886.service: Deactivated successfully. May 8 00:46:05.135098 env[1227]: time="2025-05-08T00:46:05.128004411Z" level=info msg="StartContainer for \"16ab8882526fd8c92f7b8b412bdcd6b574b362dac22856510b40e564c0ae97cd\"" May 8 00:46:05.134269 systemd[1]: session-12.scope: Deactivated successfully. May 8 00:46:05.126000 audit[3183]: CRED_DISP pid=3183 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:05.140257 kernel: audit: type=1104 audit(1746665165.126:1020): pid=3183 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:05.138513 systemd-logind[1208]: Session 12 logged out. Waiting for processes to exit. May 8 00:46:05.139950 systemd-logind[1208]: Removed session 12. May 8 00:46:05.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.60:22-10.0.0.1:48886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:05.148033 systemd[1]: Started cri-containerd-16ab8882526fd8c92f7b8b412bdcd6b574b362dac22856510b40e564c0ae97cd.scope. May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f99d6a938e8 items=0 ppid=2433 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:05.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136616238383832353236666438633932663762386234313262646364 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit: BPF prog-id=136 op=LOAD May 8 00:46:05.170000 audit[3282]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00032dbd8 items=0 ppid=2433 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:05.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136616238383832353236666438633932663762386234313262646364 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit: BPF prog-id=137 op=LOAD May 8 00:46:05.170000 audit[3282]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00032dc28 items=0 ppid=2433 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:05.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136616238383832353236666438633932663762386234313262646364 May 8 00:46:05.170000 audit: BPF prog-id=137 op=UNLOAD May 8 00:46:05.170000 audit: BPF prog-id=136 op=UNLOAD May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:05.170000 audit: BPF prog-id=138 op=LOAD May 8 00:46:05.170000 audit[3282]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00032dcb8 items=0 ppid=2433 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:05.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136616238383832353236666438633932663762386234313262646364 May 8 00:46:05.372167 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 8 00:46:05.372372 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 8 00:46:05.372418 env[1227]: time="2025-05-08T00:46:05.372154537Z" level=info msg="StartContainer for \"16ab8882526fd8c92f7b8b412bdcd6b574b362dac22856510b40e564c0ae97cd\" returns successfully" May 8 00:46:05.554834 env[1227]: time="2025-05-08T00:46:05.554756240Z" level=info msg="StopPodSandbox for \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\"" May 8 00:46:05.584265 env[1227]: time="2025-05-08T00:46:05.584182643Z" level=error msg="StopPodSandbox for \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\" failed" error="failed to destroy network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:46:05.584894 kubelet[1998]: E0508 00:46:05.584753 1998 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:46:05.584894 kubelet[1998]: E0508 00:46:05.584830 1998 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa"} May 8 00:46:05.584894 kubelet[1998]: E0508 00:46:05.584877 1998 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"467966ee-a4de-41f5-a742-c83abaf9be78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:46:05.585136 kubelet[1998]: E0508 00:46:05.584939 1998 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"467966ee-a4de-41f5-a742-c83abaf9be78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66cc78549b-4fpbh" podUID="467966ee-a4de-41f5-a742-c83abaf9be78" May 8 00:46:05.896657 kubelet[1998]: E0508 00:46:05.896203 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:05.915166 kubelet[1998]: I0508 00:46:05.915087 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-bmxb9" podStartSLOduration=1.9156100999999999 podStartE2EDuration="38.915067531s" podCreationTimestamp="2025-05-08 00:45:27 +0000 UTC" firstStartedPulling="2025-05-08 00:45:27.970793049 +0000 UTC m=+15.530653349" lastFinishedPulling="2025-05-08 00:46:04.970250479 +0000 UTC m=+52.530110780" observedRunningTime="2025-05-08 00:46:05.914854539 +0000 UTC m=+53.474714839" watchObservedRunningTime="2025-05-08 00:46:05.915067531 +0000 UTC m=+53.474927831" May 8 00:46:06.556787 env[1227]: time="2025-05-08T00:46:06.556732886Z" level=info msg="StopPodSandbox for \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\"" May 8 00:46:06.557227 env[1227]: time="2025-05-08T00:46:06.556897720Z" level=info msg="StopPodSandbox for \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\"" May 8 00:46:06.808000 audit[3464]: AVC avc: denied { write } for pid=3464 comm="tee" name="fd" dev="proc" ino=24117 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:46:06.808000 audit[3464]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa3aeda2e a2=241 a3=1b6 items=1 ppid=3450 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:06.808000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 8 00:46:06.808000 audit: PATH item=0 name="/dev/fd/63" inode=24112 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:46:06.808000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:46:06.812000 audit[3473]: AVC avc: denied { write } for pid=3473 comm="tee" name="fd" dev="proc" ino=24123 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:46:06.812000 audit[3468]: AVC avc: denied { write } for pid=3468 comm="tee" name="fd" dev="proc" ino=25180 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:46:06.812000 audit[3468]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5fe56a1f a2=241 a3=1b6 items=1 ppid=3449 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:06.812000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 8 00:46:06.812000 audit: PATH item=0 name="/dev/fd/63" inode=25171 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:46:06.812000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:46:06.812000 audit[3479]: AVC avc: denied { write } for pid=3479 comm="tee" name="fd" dev="proc" ino=26899 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:46:06.812000 audit[3479]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3e0daa2e a2=241 a3=1b6 items=1 ppid=3447 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:06.812000 audit: CWD cwd="/etc/service/enabled/confd/log" May 8 00:46:06.812000 audit: PATH item=0 name="/dev/fd/63" inode=25177 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:46:06.812000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:46:06.812000 audit[3473]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8bf0fa30 a2=241 a3=1b6 items=1 ppid=3444 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:06.812000 audit: CWD cwd="/etc/service/enabled/cni/log" May 8 00:46:06.812000 audit: PATH item=0 name="/dev/fd/63" inode=26896 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:46:06.812000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:46:06.814000 audit[3470]: AVC avc: denied { write } for pid=3470 comm="tee" name="fd" dev="proc" ino=25184 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:46:06.815000 audit[3476]: AVC avc: denied { write } for pid=3476 comm="tee" name="fd" dev="proc" ino=25187 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:46:06.814000 audit[3470]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5d9c7a2f a2=241 a3=1b6 items=1 ppid=3443 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:06.814000 audit: CWD cwd="/etc/service/enabled/bird/log" May 8 00:46:06.814000 audit: PATH item=0 name="/dev/fd/63" inode=26893 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:46:06.814000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:46:06.815000 audit[3476]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9eba5a1e a2=241 a3=1b6 items=1 ppid=3442 pid=3476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:06.815000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 8 00:46:06.815000 audit: PATH item=0 name="/dev/fd/63" inode=25176 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:46:06.815000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:46:06.816000 audit[3484]: AVC avc: denied { write } for pid=3484 comm="tee" name="fd" dev="proc" ino=25925 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:46:06.816000 audit[3484]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd77756a2e a2=241 a3=1b6 items=1 ppid=3446 pid=3484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:06.816000 audit: CWD cwd="/etc/service/enabled/felix/log" May 8 00:46:06.816000 audit: PATH item=0 name="/dev/fd/63" inode=26901 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:46:06.816000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:46:06.898255 kubelet[1998]: E0508 00:46:06.898189 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:06.939029 systemd[1]: run-containerd-runc-k8s.io-16ab8882526fd8c92f7b8b412bdcd6b574b362dac22856510b40e564c0ae97cd-runc.zjl4Za.mount: Deactivated successfully. May 8 00:46:07.133000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit: BPF prog-id=139 op=LOAD May 8 00:46:07.133000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff432448a0 a2=98 a3=3 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.133000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.133000 audit: BPF prog-id=139 op=UNLOAD May 8 00:46:07.133000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.133000 audit: BPF prog-id=140 op=LOAD May 8 00:46:07.133000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff43244680 a2=74 a3=540051 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.133000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.134000 audit: BPF prog-id=140 op=UNLOAD May 8 00:46:07.134000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.134000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.134000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.134000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.134000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.134000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.134000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.134000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.134000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.134000 audit: BPF prog-id=141 op=LOAD May 8 00:46:07.134000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff432446b0 a2=94 a3=2 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.134000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.134000 audit: BPF prog-id=141 op=UNLOAD May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:06.951 [INFO][3421] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:06.953 [INFO][3421] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" iface="eth0" netns="/var/run/netns/cni-082c9b0c-6e89-8af9-0c06-ecc1ca67e68c" May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:06.954 [INFO][3421] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" iface="eth0" netns="/var/run/netns/cni-082c9b0c-6e89-8af9-0c06-ecc1ca67e68c" May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:06.960 [INFO][3421] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" iface="eth0" netns="/var/run/netns/cni-082c9b0c-6e89-8af9-0c06-ecc1ca67e68c" May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:06.960 [INFO][3421] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:06.960 [INFO][3421] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:07.150 [INFO][3544] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" HandleID="k8s-pod-network.a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:07.151 [INFO][3544] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:07.152 [INFO][3544] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:07.164 [WARNING][3544] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" HandleID="k8s-pod-network.a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:07.164 [INFO][3544] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" HandleID="k8s-pod-network.a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:07.166 [INFO][3544] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:07.173006 env[1227]: 2025-05-08 00:46:07.170 [INFO][3421] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:07.176583 systemd[1]: run-netns-cni\x2d082c9b0c\x2d6e89\x2d8af9\x2d0c06\x2decc1ca67e68c.mount: Deactivated successfully. May 8 00:46:07.178125 env[1227]: time="2025-05-08T00:46:07.177101241Z" level=info msg="TearDown network for sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\" successfully" May 8 00:46:07.178125 env[1227]: time="2025-05-08T00:46:07.177254183Z" level=info msg="StopPodSandbox for \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\" returns successfully" May 8 00:46:07.179546 env[1227]: time="2025-05-08T00:46:07.179183572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-fbfbbffdd-bhff9,Uid:f97b153d-d30a-43c9-b786-d21b1909919c,Namespace:calico-system,Attempt:1,}" May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:06.957 [INFO][3422] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:06.957 [INFO][3422] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" iface="eth0" netns="/var/run/netns/cni-a51f78f7-498b-3799-8e7e-0d61bd02443a" May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:06.957 [INFO][3422] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" iface="eth0" netns="/var/run/netns/cni-a51f78f7-498b-3799-8e7e-0d61bd02443a" May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:06.959 [INFO][3422] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" iface="eth0" netns="/var/run/netns/cni-a51f78f7-498b-3799-8e7e-0d61bd02443a" May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:06.960 [INFO][3422] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:06.960 [INFO][3422] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:07.157 [INFO][3543] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" HandleID="k8s-pod-network.10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:07.157 [INFO][3543] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:07.169 [INFO][3543] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:07.180 [WARNING][3543] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" HandleID="k8s-pod-network.10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:07.180 [INFO][3543] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" HandleID="k8s-pod-network.10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:07.182 [INFO][3543] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:07.187022 env[1227]: 2025-05-08 00:46:07.185 [INFO][3422] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:07.191572 env[1227]: time="2025-05-08T00:46:07.190035541Z" level=info msg="TearDown network for sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\" successfully" May 8 00:46:07.191572 env[1227]: time="2025-05-08T00:46:07.190080193Z" level=info msg="StopPodSandbox for \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\" returns successfully" May 8 00:46:07.190573 systemd[1]: run-netns-cni\x2da51f78f7\x2d498b\x2d3799\x2d8e7e\x2d0d61bd02443a.mount: Deactivated successfully. May 8 00:46:07.191827 kubelet[1998]: E0508 00:46:07.190470 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:07.192278 env[1227]: time="2025-05-08T00:46:07.192246811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-l5n8x,Uid:80eac387-a1f3-4b89-9165-df3b545c65fa,Namespace:kube-system,Attempt:1,}" May 8 00:46:07.267000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.267000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.267000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.267000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.267000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.267000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.267000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.267000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.267000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.267000 audit: BPF prog-id=142 op=LOAD May 8 00:46:07.267000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff43244570 a2=40 a3=1 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.267000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.267000 audit: BPF prog-id=142 op=UNLOAD May 8 00:46:07.267000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.267000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff43244640 a2=50 a3=7fff43244720 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.267000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff43244580 a2=28 a3=0 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff432445b0 a2=28 a3=0 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff432444c0 a2=28 a3=0 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff432445d0 a2=28 a3=0 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff432445b0 a2=28 a3=0 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff432445a0 a2=28 a3=0 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff432445d0 a2=28 a3=0 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff432445b0 a2=28 a3=0 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff432445d0 a2=28 a3=0 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff432445a0 a2=28 a3=0 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff43244610 a2=28 a3=0 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff432443c0 a2=50 a3=1 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit: BPF prog-id=143 op=LOAD May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff432443c0 a2=94 a3=5 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit: BPF prog-id=143 op=UNLOAD May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff43244470 a2=50 a3=1 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff43244590 a2=4 a3=38 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.275000 audit[3600]: AVC avc: denied { confidentiality } for pid=3600 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:46:07.275000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff432445e0 a2=94 a3=6 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.275000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.276000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { confidentiality } for pid=3600 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:46:07.276000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff43243d90 a2=94 a3=83 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.276000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.276000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.276000 audit[3600]: AVC avc: denied { confidentiality } for pid=3600 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:46:07.276000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff43243d90 a2=94 a3=83 items=0 ppid=3494 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.276000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:46:07.282000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.282000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.282000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.282000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.282000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.282000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.282000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.282000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.282000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.282000 audit: BPF prog-id=144 op=LOAD May 8 00:46:07.282000 audit[3634]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5f342a50 a2=98 a3=1999999999999999 items=0 ppid=3494 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.282000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:46:07.283000 audit: BPF prog-id=144 op=UNLOAD May 8 00:46:07.283000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit: BPF prog-id=145 op=LOAD May 8 00:46:07.283000 audit[3634]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5f342930 a2=74 a3=ffff items=0 ppid=3494 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.283000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:46:07.283000 audit: BPF prog-id=145 op=UNLOAD May 8 00:46:07.283000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.283000 audit: BPF prog-id=146 op=LOAD May 8 00:46:07.283000 audit[3634]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5f342970 a2=40 a3=7fff5f342b50 items=0 ppid=3494 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.283000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:46:07.283000 audit: BPF prog-id=146 op=UNLOAD May 8 00:46:07.352107 systemd-networkd[1043]: vxlan.calico: Link UP May 8 00:46:07.352115 systemd-networkd[1043]: vxlan.calico: Gained carrier May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit: BPF prog-id=147 op=LOAD May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff43110a60 a2=98 a3=ffffffff items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit: BPF prog-id=147 op=UNLOAD May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit: BPF prog-id=148 op=LOAD May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff43110870 a2=74 a3=540051 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit: BPF prog-id=148 op=UNLOAD May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit: BPF prog-id=149 op=LOAD May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff431108a0 a2=94 a3=2 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit: BPF prog-id=149 op=UNLOAD May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff43110770 a2=28 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff431107a0 a2=28 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff431106b0 a2=28 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff431107c0 a2=28 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff431107a0 a2=28 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff43110790 a2=28 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff431107c0 a2=28 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff431107a0 a2=28 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff431107c0 a2=28 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.385000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.385000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff43110790 a2=28 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.385000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.386000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.386000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff43110800 a2=28 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.386000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.386000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.386000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.386000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.386000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.386000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.386000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.386000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.386000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.386000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.386000 audit: BPF prog-id=150 op=LOAD May 8 00:46:07.386000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff43110670 a2=40 a3=0 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.386000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.386000 audit: BPF prog-id=150 op=UNLOAD May 8 00:46:07.392000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.392000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff43110660 a2=50 a3=2800 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.392000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.392000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.392000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff43110660 a2=50 a3=2800 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.392000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit: BPF prog-id=151 op=LOAD May 8 00:46:07.393000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4310fe80 a2=94 a3=2 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.393000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.393000 audit: BPF prog-id=151 op=UNLOAD May 8 00:46:07.393000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { perfmon } for pid=3680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit[3680]: AVC avc: denied { bpf } for pid=3680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.393000 audit: BPF prog-id=152 op=LOAD May 8 00:46:07.393000 audit[3680]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff4310ff80 a2=94 a3=30 items=0 ppid=3494 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.393000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit: BPF prog-id=153 op=LOAD May 8 00:46:07.397000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf81608d0 a2=98 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.397000 audit: BPF prog-id=153 op=UNLOAD May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit: BPF prog-id=154 op=LOAD May 8 00:46:07.397000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf81606b0 a2=74 a3=540051 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.397000 audit: BPF prog-id=154 op=UNLOAD May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.397000 audit: BPF prog-id=155 op=LOAD May 8 00:46:07.397000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf81606e0 a2=94 a3=2 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.397000 audit: BPF prog-id=155 op=UNLOAD May 8 00:46:07.511327 systemd-networkd[1043]: cali15a7240e6b8: Link UP May 8 00:46:07.513335 systemd-networkd[1043]: cali15a7240e6b8: Gained carrier May 8 00:46:07.513953 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali15a7240e6b8: link becomes ready May 8 00:46:07.517000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.517000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.517000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.517000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.517000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.517000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.517000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.517000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.517000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.517000 audit: BPF prog-id=156 op=LOAD May 8 00:46:07.517000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf81605a0 a2=40 a3=1 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.517000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.518000 audit: BPF prog-id=156 op=UNLOAD May 8 00:46:07.518000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.518000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdf8160670 a2=50 a3=7ffdf8160750 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.518000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf81605b0 a2=28 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf81605e0 a2=28 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf81604f0 a2=28 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf8160600 a2=28 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf81605e0 a2=28 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf81605d0 a2=28 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf8160600 a2=28 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf81605e0 a2=28 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf8160600 a2=28 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf81605d0 a2=28 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf8160640 a2=28 a3=0 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdf81603f0 a2=50 a3=1 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit: BPF prog-id=157 op=LOAD May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf81603f0 a2=94 a3=5 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit: BPF prog-id=157 op=UNLOAD May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdf81604a0 a2=50 a3=1 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdf81605c0 a2=4 a3=38 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.525000 audit[3684]: AVC avc: denied { confidentiality } for pid=3684 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:46:07.525000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdf8160610 a2=94 a3=6 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { confidentiality } for pid=3684 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:46:07.526000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdf815fdc0 a2=94 a3=83 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.526000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { confidentiality } for pid=3684 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:46:07.526000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdf815fdc0 a2=94 a3=83 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.526000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.526000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.526000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdf8161800 a2=10 a3=208 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.526000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.527000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.527000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdf81616a0 a2=10 a3=3 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.527000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.527000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdf8161640 a2=10 a3=3 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.527000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.527000 audit[3684]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdf8161640 a2=10 a3=7 items=0 ppid=3494 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:46:07.534000 audit: BPF prog-id=152 op=UNLOAD May 8 00:46:07.597000 audit[3715]: NETFILTER_CFG table=nat:97 family=2 entries=15 op=nft_register_chain pid=3715 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:46:07.597000 audit[3715]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff00d3cae0 a2=0 a3=7fff00d3cacc items=0 ppid=3494 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.597000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.309 [INFO][3616] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0 coredns-668d6bf9bc- kube-system 80eac387-a1f3-4b89-9165-df3b545c65fa 922 0 2025-05-08 00:45:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-l5n8x eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali15a7240e6b8 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" Namespace="kube-system" Pod="coredns-668d6bf9bc-l5n8x" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--l5n8x-" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.310 [INFO][3616] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" Namespace="kube-system" Pod="coredns-668d6bf9bc-l5n8x" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.362 [INFO][3653] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" HandleID="k8s-pod-network.0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.382 [INFO][3653] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" HandleID="k8s-pod-network.0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd340), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-l5n8x", "timestamp":"2025-05-08 00:46:07.362252181 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.382 [INFO][3653] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.383 [INFO][3653] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.383 [INFO][3653] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.396 [INFO][3653] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" host="localhost" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.404 [INFO][3653] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.410 [INFO][3653] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.412 [INFO][3653] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.415 [INFO][3653] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.415 [INFO][3653] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" host="localhost" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.417 [INFO][3653] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77 May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.430 [INFO][3653] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" host="localhost" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.505 [INFO][3653] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" host="localhost" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.505 [INFO][3653] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" host="localhost" May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.505 [INFO][3653] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:07.599225 env[1227]: 2025-05-08 00:46:07.505 [INFO][3653] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" HandleID="k8s-pod-network.0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:07.601288 env[1227]: 2025-05-08 00:46:07.507 [INFO][3616] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" Namespace="kube-system" Pod="coredns-668d6bf9bc-l5n8x" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"80eac387-a1f3-4b89-9165-df3b545c65fa", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-l5n8x", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali15a7240e6b8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:07.601288 env[1227]: 2025-05-08 00:46:07.507 [INFO][3616] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" Namespace="kube-system" Pod="coredns-668d6bf9bc-l5n8x" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:07.601288 env[1227]: 2025-05-08 00:46:07.507 [INFO][3616] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali15a7240e6b8 ContainerID="0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" Namespace="kube-system" Pod="coredns-668d6bf9bc-l5n8x" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:07.601288 env[1227]: 2025-05-08 00:46:07.525 [INFO][3616] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" Namespace="kube-system" Pod="coredns-668d6bf9bc-l5n8x" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:07.601288 env[1227]: 2025-05-08 00:46:07.525 [INFO][3616] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" Namespace="kube-system" Pod="coredns-668d6bf9bc-l5n8x" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"80eac387-a1f3-4b89-9165-df3b545c65fa", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77", Pod:"coredns-668d6bf9bc-l5n8x", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali15a7240e6b8", MAC:"22:83:ec:70:17:7a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:07.601288 env[1227]: 2025-05-08 00:46:07.596 [INFO][3616] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77" Namespace="kube-system" Pod="coredns-668d6bf9bc-l5n8x" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:07.600000 audit[3716]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=3716 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:46:07.600000 audit[3716]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fffdd8a29f0 a2=0 a3=7fffdd8a29dc items=0 ppid=3494 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.600000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:46:07.601000 audit[3719]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=3719 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:46:07.601000 audit[3719]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffeb921bee0 a2=0 a3=7ffeb921becc items=0 ppid=3494 pid=3719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.601000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:46:07.608000 audit[3714]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3714 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:46:07.608000 audit[3714]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdd61ab540 a2=0 a3=7ffdd61ab52c items=0 ppid=3494 pid=3714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.608000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:46:07.624000 audit[3739]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3739 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:46:07.624000 audit[3739]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fffd04214e0 a2=0 a3=7fffd04214cc items=0 ppid=3494 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.624000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:46:07.656280 env[1227]: time="2025-05-08T00:46:07.656088203Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:46:07.656280 env[1227]: time="2025-05-08T00:46:07.656133608Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:46:07.656280 env[1227]: time="2025-05-08T00:46:07.656144218Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:46:07.657067 env[1227]: time="2025-05-08T00:46:07.656999455Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77 pid=3747 runtime=io.containerd.runc.v2 May 8 00:46:07.670174 systemd[1]: Started cri-containerd-0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77.scope. May 8 00:46:07.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.685000 audit: BPF prog-id=158 op=LOAD May 8 00:46:07.685000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.685000 audit[3757]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3747 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396338366439326164636435633061636263333964363137376331 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3747 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396338366439326164636435633061636263333964363137376331 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit: BPF prog-id=159 op=LOAD May 8 00:46:07.686000 audit[3757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000382f40 items=0 ppid=3747 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396338366439326164636435633061636263333964363137376331 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit: BPF prog-id=160 op=LOAD May 8 00:46:07.686000 audit[3757]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000382f88 items=0 ppid=3747 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396338366439326164636435633061636263333964363137376331 May 8 00:46:07.686000 audit: BPF prog-id=160 op=UNLOAD May 8 00:46:07.686000 audit: BPF prog-id=159 op=UNLOAD May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:07.686000 audit: BPF prog-id=161 op=LOAD May 8 00:46:07.686000 audit[3757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000383398 items=0 ppid=3747 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:07.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063396338366439326164636435633061636263333964363137376331 May 8 00:46:07.688342 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:46:07.717747 env[1227]: time="2025-05-08T00:46:07.717686535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-l5n8x,Uid:80eac387-a1f3-4b89-9165-df3b545c65fa,Namespace:kube-system,Attempt:1,} returns sandbox id \"0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77\"" May 8 00:46:07.738876 env[1227]: time="2025-05-08T00:46:07.720401924Z" level=info msg="CreateContainer within sandbox \"0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:46:07.739071 kubelet[1998]: E0508 00:46:07.718359 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:07.788015 systemd-networkd[1043]: cali6303c18bb61: Link UP May 8 00:46:07.805756 systemd-networkd[1043]: cali6303c18bb61: Gained carrier May 8 00:46:07.806065 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6303c18bb61: link becomes ready May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.309 [INFO][3605] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0 calico-kube-controllers-fbfbbffdd- calico-system f97b153d-d30a-43c9-b786-d21b1909919c 921 0 2025-05-08 00:45:27 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:fbfbbffdd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-fbfbbffdd-bhff9 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali6303c18bb61 [] []}} ContainerID="e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" Namespace="calico-system" Pod="calico-kube-controllers-fbfbbffdd-bhff9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.309 [INFO][3605] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" Namespace="calico-system" Pod="calico-kube-controllers-fbfbbffdd-bhff9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.375 [INFO][3650] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" HandleID="k8s-pod-network.e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.393 [INFO][3650] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" HandleID="k8s-pod-network.e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000309e60), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-fbfbbffdd-bhff9", "timestamp":"2025-05-08 00:46:07.37560858 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.393 [INFO][3650] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.505 [INFO][3650] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.505 [INFO][3650] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.515 [INFO][3650] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" host="localhost" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.520 [INFO][3650] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.526 [INFO][3650] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.528 [INFO][3650] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.533 [INFO][3650] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.533 [INFO][3650] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" host="localhost" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.536 [INFO][3650] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8 May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.714 [INFO][3650] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" host="localhost" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.783 [INFO][3650] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" host="localhost" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.784 [INFO][3650] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" host="localhost" May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.784 [INFO][3650] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:08.557496 env[1227]: 2025-05-08 00:46:07.784 [INFO][3650] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" HandleID="k8s-pod-network.e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:08.558691 env[1227]: 2025-05-08 00:46:07.786 [INFO][3605] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" Namespace="calico-system" Pod="calico-kube-controllers-fbfbbffdd-bhff9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0", GenerateName:"calico-kube-controllers-fbfbbffdd-", Namespace:"calico-system", SelfLink:"", UID:"f97b153d-d30a-43c9-b786-d21b1909919c", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"fbfbbffdd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-fbfbbffdd-bhff9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6303c18bb61", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:08.558691 env[1227]: 2025-05-08 00:46:07.786 [INFO][3605] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" Namespace="calico-system" Pod="calico-kube-controllers-fbfbbffdd-bhff9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:08.558691 env[1227]: 2025-05-08 00:46:07.786 [INFO][3605] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6303c18bb61 ContainerID="e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" Namespace="calico-system" Pod="calico-kube-controllers-fbfbbffdd-bhff9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:08.558691 env[1227]: 2025-05-08 00:46:07.788 [INFO][3605] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" Namespace="calico-system" Pod="calico-kube-controllers-fbfbbffdd-bhff9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:08.558691 env[1227]: 2025-05-08 00:46:07.789 [INFO][3605] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" Namespace="calico-system" Pod="calico-kube-controllers-fbfbbffdd-bhff9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0", GenerateName:"calico-kube-controllers-fbfbbffdd-", Namespace:"calico-system", SelfLink:"", UID:"f97b153d-d30a-43c9-b786-d21b1909919c", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"fbfbbffdd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8", Pod:"calico-kube-controllers-fbfbbffdd-bhff9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6303c18bb61", MAC:"8a:c6:d1:63:68:e1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:08.558691 env[1227]: 2025-05-08 00:46:08.555 [INFO][3605] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8" Namespace="calico-system" Pod="calico-kube-controllers-fbfbbffdd-bhff9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:08.566000 audit[3796]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3796 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:46:08.566000 audit[3796]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc22097b50 a2=0 a3=7ffc22097b3c items=0 ppid=3494 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:08.566000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:46:08.926168 systemd-networkd[1043]: vxlan.calico: Gained IPv6LL May 8 00:46:09.071531 env[1227]: time="2025-05-08T00:46:09.071418803Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:46:09.071531 env[1227]: time="2025-05-08T00:46:09.071464087Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:46:09.071531 env[1227]: time="2025-05-08T00:46:09.071477562Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:46:09.071964 env[1227]: time="2025-05-08T00:46:09.071699162Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8 pid=3804 runtime=io.containerd.runc.v2 May 8 00:46:09.090265 systemd[1]: Started cri-containerd-e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8.scope. May 8 00:46:09.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.102999 kernel: kauditd_printk_skb: 622 callbacks suppressed May 8 00:46:09.103075 kernel: audit: type=1400 audit(1746665169.100:1150): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.103479 env[1227]: time="2025-05-08T00:46:09.103410923Z" level=info msg="CreateContainer within sandbox \"0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"296fe1bd0a030c44bfdb2c2fb7a100155e4db500aa8ed20ba48ea49f884f0b86\"" May 8 00:46:09.105752 env[1227]: time="2025-05-08T00:46:09.104537929Z" level=info msg="StartContainer for \"296fe1bd0a030c44bfdb2c2fb7a100155e4db500aa8ed20ba48ea49f884f0b86\"" May 8 00:46:09.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.110880 kernel: audit: type=1400 audit(1746665169.100:1151): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.111021 kernel: audit: type=1400 audit(1746665169.100:1152): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.115954 kernel: audit: type=1400 audit(1746665169.100:1153): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.122286 kernel: audit: type=1400 audit(1746665169.100:1154): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.125790 kernel: audit: type=1400 audit(1746665169.100:1155): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.126029 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:46:09.128200 systemd[1]: Started cri-containerd-296fe1bd0a030c44bfdb2c2fb7a100155e4db500aa8ed20ba48ea49f884f0b86.scope. May 8 00:46:09.130023 kernel: audit: type=1400 audit(1746665169.100:1156): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.136896 kernel: audit: type=1400 audit(1746665169.100:1157): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.136978 kernel: audit: type=1400 audit(1746665169.100:1158): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit: BPF prog-id=162 op=LOAD May 8 00:46:09.140953 kernel: audit: type=1400 audit(1746665169.105:1159): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3804 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:09.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534363263336237366462626339323563613637663562336137626461 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3804 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:09.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534363263336237366462626339323563613637663562336137626461 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.106000 audit: BPF prog-id=163 op=LOAD May 8 00:46:09.106000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00035ecd0 items=0 ppid=3804 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:09.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534363263336237366462626339323563613637663562336137626461 May 8 00:46:09.114000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.114000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.114000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.114000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.114000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.114000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.114000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.114000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.114000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.114000 audit: BPF prog-id=164 op=LOAD May 8 00:46:09.114000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00035ed18 items=0 ppid=3804 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:09.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534363263336237366462626339323563613637663562336137626461 May 8 00:46:09.118000 audit: BPF prog-id=164 op=UNLOAD May 8 00:46:09.118000 audit: BPF prog-id=163 op=UNLOAD May 8 00:46:09.118000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.118000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.118000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.118000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.118000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.118000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.118000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.118000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.118000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.118000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.118000 audit: BPF prog-id=165 op=LOAD May 8 00:46:09.118000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00035f128 items=0 ppid=3804 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:09.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534363263336237366462626339323563613637663562336137626461 May 8 00:46:09.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.151000 audit: BPF prog-id=166 op=LOAD May 8 00:46:09.152000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3747 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:09.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239366665316264306130333063343462666462326332666237613130 May 8 00:46:09.152000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3747 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:09.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239366665316264306130333063343462666462326332666237613130 May 8 00:46:09.152000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.152000 audit: BPF prog-id=167 op=LOAD May 8 00:46:09.152000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000161750 items=0 ppid=3747 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:09.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239366665316264306130333063343462666462326332666237613130 May 8 00:46:09.153000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.153000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.153000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.153000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.153000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.153000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.153000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.153000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.153000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.153000 audit: BPF prog-id=168 op=LOAD May 8 00:46:09.153000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000161798 items=0 ppid=3747 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:09.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239366665316264306130333063343462666462326332666237613130 May 8 00:46:09.154000 audit: BPF prog-id=168 op=UNLOAD May 8 00:46:09.154000 audit: BPF prog-id=167 op=UNLOAD May 8 00:46:09.155000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.155000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.155000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.155000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.155000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.155000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.155000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.155000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.155000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.155000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:09.155000 audit: BPF prog-id=169 op=LOAD May 8 00:46:09.155000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000161ba8 items=0 ppid=3747 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:09.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239366665316264306130333063343462666462326332666237613130 May 8 00:46:09.165806 env[1227]: time="2025-05-08T00:46:09.165751289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-fbfbbffdd-bhff9,Uid:f97b153d-d30a-43c9-b786-d21b1909919c,Namespace:calico-system,Attempt:1,} returns sandbox id \"e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8\"" May 8 00:46:09.167290 env[1227]: time="2025-05-08T00:46:09.167252878Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 8 00:46:09.178062 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount444753497.mount: Deactivated successfully. May 8 00:46:09.181171 env[1227]: time="2025-05-08T00:46:09.181112910Z" level=info msg="StartContainer for \"296fe1bd0a030c44bfdb2c2fb7a100155e4db500aa8ed20ba48ea49f884f0b86\" returns successfully" May 8 00:46:09.182100 systemd-networkd[1043]: cali15a7240e6b8: Gained IPv6LL May 8 00:46:09.334000 audit[3851]: AVC avc: denied { getattr } for pid=3851 comm="coredns" path="cgroup:[4026532370]" dev="nsfs" ino=4026532370 scontext=system_u:system_r:svirt_lxc_net_t:s0:c318,c766 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 8 00:46:09.334000 audit[3851]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c00049eb98 a3=0 items=0 ppid=3747 pid=3851 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c318,c766 key=(null) May 8 00:46:09.334000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 8 00:46:09.503042 systemd-networkd[1043]: cali6303c18bb61: Gained IPv6LL May 8 00:46:09.519000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:09.519000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:09.519000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00267eb70 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:46:09.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:46:09.519000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023b2240 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:46:09.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:46:09.767000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:09.767000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:09.767000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003ad4900 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:46:09.767000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00d7bb6c0 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:46:09.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:46:09.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:46:09.767000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:09.767000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c007160b10 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:46:09.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:46:09.767000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:09.767000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00fa4fc80 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:46:09.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:46:09.788000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:09.788000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00eb10c80 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:46:09.788000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:46:09.789000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:09.789000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c007160bd0 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:46:09.789000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:46:09.908543 kubelet[1998]: E0508 00:46:09.908492 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:10.102887 kubelet[1998]: I0508 00:46:10.102615 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-l5n8x" podStartSLOduration=51.102593963 podStartE2EDuration="51.102593963s" podCreationTimestamp="2025-05-08 00:45:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:46:10.102375658 +0000 UTC m=+57.662235958" watchObservedRunningTime="2025-05-08 00:46:10.102593963 +0000 UTC m=+57.662454263" May 8 00:46:10.130965 systemd[1]: Started sshd@12-10.0.0.60:22-10.0.0.1:42404.service. May 8 00:46:10.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.60:22-10.0.0.1:42404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:10.155000 audit[3880]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:10.155000 audit[3880]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdc578c410 a2=0 a3=7ffdc578c3fc items=0 ppid=2184 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:10.155000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:10.165000 audit[3880]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=3880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:10.165000 audit[3880]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdc578c410 a2=0 a3=7ffdc578c3fc items=0 ppid=2184 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:10.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:10.175000 audit[3877]: USER_ACCT pid=3877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:10.176894 sshd[3877]: Accepted publickey for core from 10.0.0.1 port 42404 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:10.176000 audit[3877]: CRED_ACQ pid=3877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:10.177000 audit[3877]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6d649e30 a2=3 a3=0 items=0 ppid=1 pid=3877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:10.177000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:10.178537 sshd[3877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:10.182593 systemd-logind[1208]: New session 13 of user core. May 8 00:46:10.183482 systemd[1]: Started session-13.scope. May 8 00:46:10.187000 audit[3877]: USER_START pid=3877 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:10.189000 audit[3882]: CRED_ACQ pid=3882 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:10.189000 audit[3883]: NETFILTER_CFG table=filter:105 family=2 entries=10 op=nft_register_rule pid=3883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:10.189000 audit[3883]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe8425e540 a2=0 a3=7ffe8425e52c items=0 ppid=2184 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:10.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:10.194000 audit[3883]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:10.194000 audit[3883]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe8425e540 a2=0 a3=7ffe8425e52c items=0 ppid=2184 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:10.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:10.301544 sshd[3877]: pam_unix(sshd:session): session closed for user core May 8 00:46:10.301000 audit[3877]: USER_END pid=3877 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:10.301000 audit[3877]: CRED_DISP pid=3877 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:10.304378 systemd[1]: sshd@12-10.0.0.60:22-10.0.0.1:42404.service: Deactivated successfully. May 8 00:46:10.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.60:22-10.0.0.1:42404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:10.305363 systemd[1]: session-13.scope: Deactivated successfully. May 8 00:46:10.306268 systemd-logind[1208]: Session 13 logged out. Waiting for processes to exit. May 8 00:46:10.307322 systemd-logind[1208]: Removed session 13. May 8 00:46:10.912598 kubelet[1998]: E0508 00:46:10.912550 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:11.914547 kubelet[1998]: E0508 00:46:11.914502 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:11.922532 env[1227]: time="2025-05-08T00:46:11.922342031Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:11.934833 env[1227]: time="2025-05-08T00:46:11.934721262Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:11.944597 env[1227]: time="2025-05-08T00:46:11.944150416Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:11.948172 env[1227]: time="2025-05-08T00:46:11.948089478Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:11.948633 env[1227]: time="2025-05-08T00:46:11.948570702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 8 00:46:11.958485 env[1227]: time="2025-05-08T00:46:11.958422581Z" level=info msg="CreateContainer within sandbox \"e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 8 00:46:11.978370 env[1227]: time="2025-05-08T00:46:11.978293089Z" level=info msg="CreateContainer within sandbox \"e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a65e7a8ebe2fbbe0a5edd97d238bd47ac7c4004e34a72f609655ffc5b9c08ad0\"" May 8 00:46:11.979083 env[1227]: time="2025-05-08T00:46:11.979034055Z" level=info msg="StartContainer for \"a65e7a8ebe2fbbe0a5edd97d238bd47ac7c4004e34a72f609655ffc5b9c08ad0\"" May 8 00:46:11.997390 systemd[1]: Started cri-containerd-a65e7a8ebe2fbbe0a5edd97d238bd47ac7c4004e34a72f609655ffc5b9c08ad0.scope. May 8 00:46:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.011000 audit: BPF prog-id=170 op=LOAD May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3804 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:12.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136356537613865626532666262653061356564643937643233386264 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3804 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:12.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136356537613865626532666262653061356564643937643233386264 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit: BPF prog-id=171 op=LOAD May 8 00:46:12.012000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a0630 items=0 ppid=3804 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:12.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136356537613865626532666262653061356564643937643233386264 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit: BPF prog-id=172 op=LOAD May 8 00:46:12.012000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a0678 items=0 ppid=3804 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:12.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136356537613865626532666262653061356564643937643233386264 May 8 00:46:12.012000 audit: BPF prog-id=172 op=UNLOAD May 8 00:46:12.012000 audit: BPF prog-id=171 op=UNLOAD May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:12.012000 audit: BPF prog-id=173 op=LOAD May 8 00:46:12.012000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a0a88 items=0 ppid=3804 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:12.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136356537613865626532666262653061356564643937643233386264 May 8 00:46:12.043448 env[1227]: time="2025-05-08T00:46:12.043368240Z" level=info msg="StartContainer for \"a65e7a8ebe2fbbe0a5edd97d238bd47ac7c4004e34a72f609655ffc5b9c08ad0\" returns successfully" May 8 00:46:12.546694 env[1227]: time="2025-05-08T00:46:12.546648528Z" level=info msg="StopPodSandbox for \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\"" May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.583 [WARNING][3947] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"80eac387-a1f3-4b89-9165-df3b545c65fa", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77", Pod:"coredns-668d6bf9bc-l5n8x", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali15a7240e6b8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.583 [INFO][3947] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.584 [INFO][3947] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" iface="eth0" netns="" May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.584 [INFO][3947] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.584 [INFO][3947] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.607 [INFO][3958] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" HandleID="k8s-pod-network.10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.607 [INFO][3958] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.607 [INFO][3958] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.614 [WARNING][3958] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" HandleID="k8s-pod-network.10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.614 [INFO][3958] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" HandleID="k8s-pod-network.10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.619 [INFO][3958] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:12.622867 env[1227]: 2025-05-08 00:46:12.620 [INFO][3947] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:12.623506 env[1227]: time="2025-05-08T00:46:12.622873490Z" level=info msg="TearDown network for sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\" successfully" May 8 00:46:12.623506 env[1227]: time="2025-05-08T00:46:12.622964168Z" level=info msg="StopPodSandbox for \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\" returns successfully" May 8 00:46:12.623578 env[1227]: time="2025-05-08T00:46:12.623562440Z" level=info msg="RemovePodSandbox for \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\"" May 8 00:46:12.623633 env[1227]: time="2025-05-08T00:46:12.623588749Z" level=info msg="Forcibly stopping sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\"" May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.657 [WARNING][3986] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"80eac387-a1f3-4b89-9165-df3b545c65fa", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0c9c86d92adcd5c0acbc39d6177c1a7159ffcb440b5abd2082b5f3a5711cfa77", Pod:"coredns-668d6bf9bc-l5n8x", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali15a7240e6b8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.657 [INFO][3986] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.657 [INFO][3986] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" iface="eth0" netns="" May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.657 [INFO][3986] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.657 [INFO][3986] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.681 [INFO][3994] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" HandleID="k8s-pod-network.10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.681 [INFO][3994] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.681 [INFO][3994] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.692 [WARNING][3994] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" HandleID="k8s-pod-network.10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.692 [INFO][3994] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" HandleID="k8s-pod-network.10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" Workload="localhost-k8s-coredns--668d6bf9bc--l5n8x-eth0" May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.694 [INFO][3994] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:12.698427 env[1227]: 2025-05-08 00:46:12.696 [INFO][3986] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7" May 8 00:46:12.699048 env[1227]: time="2025-05-08T00:46:12.698467207Z" level=info msg="TearDown network for sandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\" successfully" May 8 00:46:12.957510 kubelet[1998]: I0508 00:46:12.956576 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-fbfbbffdd-bhff9" podStartSLOduration=43.173531143 podStartE2EDuration="45.956557758s" podCreationTimestamp="2025-05-08 00:45:27 +0000 UTC" firstStartedPulling="2025-05-08 00:46:09.166890026 +0000 UTC m=+56.726750336" lastFinishedPulling="2025-05-08 00:46:11.949916651 +0000 UTC m=+59.509776951" observedRunningTime="2025-05-08 00:46:12.956015941 +0000 UTC m=+60.515876231" watchObservedRunningTime="2025-05-08 00:46:12.956557758 +0000 UTC m=+60.516418058" May 8 00:46:13.005165 env[1227]: time="2025-05-08T00:46:13.005081270Z" level=info msg="RemovePodSandbox \"10477d19b53704f10211bc2c90184a53ae38b96e1f051d04c98639698e1cd3c7\" returns successfully" May 8 00:46:13.006680 env[1227]: time="2025-05-08T00:46:13.005896598Z" level=info msg="StopPodSandbox for \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\"" May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.046 [WARNING][4038] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0", GenerateName:"calico-kube-controllers-fbfbbffdd-", Namespace:"calico-system", SelfLink:"", UID:"f97b153d-d30a-43c9-b786-d21b1909919c", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"fbfbbffdd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8", Pod:"calico-kube-controllers-fbfbbffdd-bhff9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6303c18bb61", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.046 [INFO][4038] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.046 [INFO][4038] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" iface="eth0" netns="" May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.046 [INFO][4038] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.046 [INFO][4038] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.068 [INFO][4047] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" HandleID="k8s-pod-network.a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.068 [INFO][4047] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.068 [INFO][4047] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.075 [WARNING][4047] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" HandleID="k8s-pod-network.a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.075 [INFO][4047] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" HandleID="k8s-pod-network.a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.077 [INFO][4047] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:13.080063 env[1227]: 2025-05-08 00:46:13.078 [INFO][4038] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:13.080859 env[1227]: time="2025-05-08T00:46:13.080103252Z" level=info msg="TearDown network for sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\" successfully" May 8 00:46:13.080859 env[1227]: time="2025-05-08T00:46:13.080137635Z" level=info msg="StopPodSandbox for \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\" returns successfully" May 8 00:46:13.080859 env[1227]: time="2025-05-08T00:46:13.080720831Z" level=info msg="RemovePodSandbox for \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\"" May 8 00:46:13.080859 env[1227]: time="2025-05-08T00:46:13.080767307Z" level=info msg="Forcibly stopping sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\"" May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.116 [WARNING][4070] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0", GenerateName:"calico-kube-controllers-fbfbbffdd-", Namespace:"calico-system", SelfLink:"", UID:"f97b153d-d30a-43c9-b786-d21b1909919c", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"fbfbbffdd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e462c3b76dbbc925ca67f5b3a7bdab31335336d94b769b146f77c00ac0aa9cc8", Pod:"calico-kube-controllers-fbfbbffdd-bhff9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6303c18bb61", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.116 [INFO][4070] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.116 [INFO][4070] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" iface="eth0" netns="" May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.116 [INFO][4070] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.116 [INFO][4070] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.138 [INFO][4078] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" HandleID="k8s-pod-network.a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.138 [INFO][4078] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.138 [INFO][4078] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.145 [WARNING][4078] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" HandleID="k8s-pod-network.a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.145 [INFO][4078] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" HandleID="k8s-pod-network.a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" Workload="localhost-k8s-calico--kube--controllers--fbfbbffdd--bhff9-eth0" May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.147 [INFO][4078] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:13.150899 env[1227]: 2025-05-08 00:46:13.149 [INFO][4070] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3" May 8 00:46:13.151472 env[1227]: time="2025-05-08T00:46:13.150929632Z" level=info msg="TearDown network for sandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\" successfully" May 8 00:46:13.225891 env[1227]: time="2025-05-08T00:46:13.225701416Z" level=info msg="RemovePodSandbox \"a2afe4f6e2a5f5445cef4dfde9c20246eea3540768ffe807e21113f468d96cd3\" returns successfully" May 8 00:46:13.962000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:13.962000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00123df20 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:46:13.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:46:13.962000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:13.962000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00221dba0 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:46:13.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:46:13.962000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:13.962000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023b3e40 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:46:13.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:46:13.970000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:46:13.970000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00123df40 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:46:13.970000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:46:15.305746 systemd[1]: Started sshd@13-10.0.0.60:22-10.0.0.1:57094.service. May 8 00:46:15.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.60:22-10.0.0.1:57094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:15.311951 kernel: kauditd_printk_skb: 223 callbacks suppressed May 8 00:46:15.312247 kernel: audit: type=1130 audit(1746665175.304:1230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.60:22-10.0.0.1:57094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:15.345000 audit[4089]: USER_ACCT pid=4089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.346767 sshd[4089]: Accepted publickey for core from 10.0.0.1 port 57094 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:15.350000 audit[4089]: CRED_ACQ pid=4089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.351702 sshd[4089]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:15.355634 kernel: audit: type=1101 audit(1746665175.345:1231): pid=4089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.355707 kernel: audit: type=1103 audit(1746665175.350:1232): pid=4089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.355743 kernel: audit: type=1006 audit(1746665175.350:1233): pid=4089 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 8 00:46:15.356081 systemd-logind[1208]: New session 14 of user core. May 8 00:46:15.357036 systemd[1]: Started session-14.scope. May 8 00:46:15.358151 kernel: audit: type=1300 audit(1746665175.350:1233): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa55d0690 a2=3 a3=0 items=0 ppid=1 pid=4089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:15.350000 audit[4089]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa55d0690 a2=3 a3=0 items=0 ppid=1 pid=4089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:15.364196 kernel: audit: type=1327 audit(1746665175.350:1233): proctitle=737368643A20636F7265205B707269765D May 8 00:46:15.350000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:15.360000 audit[4089]: USER_START pid=4089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.369130 kernel: audit: type=1105 audit(1746665175.360:1234): pid=4089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.369200 kernel: audit: type=1103 audit(1746665175.361:1235): pid=4091 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.361000 audit[4091]: CRED_ACQ pid=4091 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.498409 sshd[4089]: pam_unix(sshd:session): session closed for user core May 8 00:46:15.498000 audit[4089]: USER_END pid=4089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.502586 systemd[1]: sshd@13-10.0.0.60:22-10.0.0.1:57094.service: Deactivated successfully. May 8 00:46:15.503372 systemd[1]: session-14.scope: Deactivated successfully. May 8 00:46:15.505477 systemd[1]: Started sshd@14-10.0.0.60:22-10.0.0.1:57106.service. May 8 00:46:15.508262 systemd-logind[1208]: Session 14 logged out. Waiting for processes to exit. May 8 00:46:15.509285 systemd-logind[1208]: Removed session 14. May 8 00:46:15.511992 kernel: audit: type=1106 audit(1746665175.498:1236): pid=4089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.512064 kernel: audit: type=1104 audit(1746665175.498:1237): pid=4089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.498000 audit[4089]: CRED_DISP pid=4089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.60:22-10.0.0.1:57094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:15.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.60:22-10.0.0.1:57106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:15.544000 audit[4103]: USER_ACCT pid=4103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.545809 sshd[4103]: Accepted publickey for core from 10.0.0.1 port 57106 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:15.545000 audit[4103]: CRED_ACQ pid=4103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.545000 audit[4103]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6908a380 a2=3 a3=0 items=0 ppid=1 pid=4103 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:15.545000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:15.546975 sshd[4103]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:15.550709 systemd-logind[1208]: New session 15 of user core. May 8 00:46:15.551610 systemd[1]: Started session-15.scope. May 8 00:46:15.554000 audit[4103]: USER_START pid=4103 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.558000 audit[4105]: CRED_ACQ pid=4105 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.757453 sshd[4103]: pam_unix(sshd:session): session closed for user core May 8 00:46:15.757000 audit[4103]: USER_END pid=4103 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.758000 audit[4103]: CRED_DISP pid=4103 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.761189 systemd[1]: sshd@14-10.0.0.60:22-10.0.0.1:57106.service: Deactivated successfully. May 8 00:46:15.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.60:22-10.0.0.1:57106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:15.762009 systemd[1]: session-15.scope: Deactivated successfully. May 8 00:46:15.762836 systemd-logind[1208]: Session 15 logged out. Waiting for processes to exit. May 8 00:46:15.764507 systemd[1]: Started sshd@15-10.0.0.60:22-10.0.0.1:57114.service. May 8 00:46:15.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.60:22-10.0.0.1:57114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:15.765643 systemd-logind[1208]: Removed session 15. May 8 00:46:15.804000 audit[4115]: USER_ACCT pid=4115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.805349 sshd[4115]: Accepted publickey for core from 10.0.0.1 port 57114 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:15.805000 audit[4115]: CRED_ACQ pid=4115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.805000 audit[4115]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd350f3e0 a2=3 a3=0 items=0 ppid=1 pid=4115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:15.805000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:15.806434 sshd[4115]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:15.809986 systemd-logind[1208]: New session 16 of user core. May 8 00:46:15.810972 systemd[1]: Started session-16.scope. May 8 00:46:15.814000 audit[4115]: USER_START pid=4115 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:15.815000 audit[4117]: CRED_ACQ pid=4117 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:16.061881 sshd[4115]: pam_unix(sshd:session): session closed for user core May 8 00:46:16.062000 audit[4115]: USER_END pid=4115 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:16.062000 audit[4115]: CRED_DISP pid=4115 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:16.064358 systemd[1]: sshd@15-10.0.0.60:22-10.0.0.1:57114.service: Deactivated successfully. May 8 00:46:16.065076 systemd[1]: session-16.scope: Deactivated successfully. May 8 00:46:16.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.60:22-10.0.0.1:57114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:16.065621 systemd-logind[1208]: Session 16 logged out. Waiting for processes to exit. May 8 00:46:16.066261 systemd-logind[1208]: Removed session 16. May 8 00:46:16.554570 env[1227]: time="2025-05-08T00:46:16.554508697Z" level=info msg="StopPodSandbox for \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\"" May 8 00:46:16.554998 env[1227]: time="2025-05-08T00:46:16.554507535Z" level=info msg="StopPodSandbox for \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\"" May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.787 [INFO][4161] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.787 [INFO][4161] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" iface="eth0" netns="/var/run/netns/cni-eaa8e52c-13b1-69f3-86f7-6c2e711e7e80" May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.787 [INFO][4161] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" iface="eth0" netns="/var/run/netns/cni-eaa8e52c-13b1-69f3-86f7-6c2e711e7e80" May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.787 [INFO][4161] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" iface="eth0" netns="/var/run/netns/cni-eaa8e52c-13b1-69f3-86f7-6c2e711e7e80" May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.788 [INFO][4161] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.788 [INFO][4161] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.813 [INFO][4176] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" HandleID="k8s-pod-network.ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.814 [INFO][4176] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.814 [INFO][4176] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.821 [WARNING][4176] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" HandleID="k8s-pod-network.ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.821 [INFO][4176] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" HandleID="k8s-pod-network.ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.822 [INFO][4176] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:16.826293 env[1227]: 2025-05-08 00:46:16.824 [INFO][4161] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:46:16.827602 env[1227]: time="2025-05-08T00:46:16.826527739Z" level=info msg="TearDown network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\" successfully" May 8 00:46:16.827602 env[1227]: time="2025-05-08T00:46:16.826564769Z" level=info msg="StopPodSandbox for \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\" returns successfully" May 8 00:46:16.827783 kubelet[1998]: E0508 00:46:16.826987 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:16.828452 env[1227]: time="2025-05-08T00:46:16.827668631Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-7cskf,Uid:f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04,Namespace:kube-system,Attempt:1,}" May 8 00:46:16.829620 systemd[1]: run-netns-cni\x2deaa8e52c\x2d13b1\x2d69f3\x2d86f7\x2d6c2e711e7e80.mount: Deactivated successfully. May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.799 [INFO][4162] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.799 [INFO][4162] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" iface="eth0" netns="/var/run/netns/cni-ed198d84-cdd7-f457-9023-063e5a56b262" May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.799 [INFO][4162] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" iface="eth0" netns="/var/run/netns/cni-ed198d84-cdd7-f457-9023-063e5a56b262" May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.800 [INFO][4162] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" iface="eth0" netns="/var/run/netns/cni-ed198d84-cdd7-f457-9023-063e5a56b262" May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.800 [INFO][4162] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.800 [INFO][4162] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.824 [INFO][4183] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" HandleID="k8s-pod-network.5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.824 [INFO][4183] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.824 [INFO][4183] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.838 [WARNING][4183] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" HandleID="k8s-pod-network.5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.838 [INFO][4183] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" HandleID="k8s-pod-network.5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.841 [INFO][4183] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:16.844703 env[1227]: 2025-05-08 00:46:16.843 [INFO][4162] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:46:16.847842 systemd[1]: run-netns-cni\x2ded198d84\x2dcdd7\x2df457\x2d9023\x2d063e5a56b262.mount: Deactivated successfully. May 8 00:46:16.848708 env[1227]: time="2025-05-08T00:46:16.848655808Z" level=info msg="TearDown network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\" successfully" May 8 00:46:16.848708 env[1227]: time="2025-05-08T00:46:16.848706083Z" level=info msg="StopPodSandbox for \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\" returns successfully" May 8 00:46:16.849557 env[1227]: time="2025-05-08T00:46:16.849523109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-66j7s,Uid:72562622-3187-4bfb-96bf-cf9ba7859ac7,Namespace:calico-system,Attempt:1,}" May 8 00:46:17.195813 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:46:17.196144 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic101de8fe21: link becomes ready May 8 00:46:17.194042 systemd-networkd[1043]: calic101de8fe21: Link UP May 8 00:46:17.196460 systemd-networkd[1043]: calic101de8fe21: Gained carrier May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.038 [INFO][4192] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--66j7s-eth0 csi-node-driver- calico-system 72562622-3187-4bfb-96bf-cf9ba7859ac7 1008 0 2025-05-08 00:45:27 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-66j7s eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calic101de8fe21 [] []}} ContainerID="f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" Namespace="calico-system" Pod="csi-node-driver-66j7s" WorkloadEndpoint="localhost-k8s-csi--node--driver--66j7s-" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.038 [INFO][4192] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" Namespace="calico-system" Pod="csi-node-driver-66j7s" WorkloadEndpoint="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.069 [INFO][4218] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" HandleID="k8s-pod-network.f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.077 [INFO][4218] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" HandleID="k8s-pod-network.f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000297600), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-66j7s", "timestamp":"2025-05-08 00:46:17.069223741 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.077 [INFO][4218] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.077 [INFO][4218] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.077 [INFO][4218] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.079 [INFO][4218] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" host="localhost" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.084 [INFO][4218] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.090 [INFO][4218] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.092 [INFO][4218] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.095 [INFO][4218] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.095 [INFO][4218] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" host="localhost" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.097 [INFO][4218] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2 May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.120 [INFO][4218] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" host="localhost" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.190 [INFO][4218] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" host="localhost" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.190 [INFO][4218] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" host="localhost" May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.190 [INFO][4218] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:17.213234 env[1227]: 2025-05-08 00:46:17.190 [INFO][4218] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" HandleID="k8s-pod-network.f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:46:17.213947 env[1227]: 2025-05-08 00:46:17.192 [INFO][4192] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" Namespace="calico-system" Pod="csi-node-driver-66j7s" WorkloadEndpoint="localhost-k8s-csi--node--driver--66j7s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--66j7s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"72562622-3187-4bfb-96bf-cf9ba7859ac7", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-66j7s", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic101de8fe21", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:17.213947 env[1227]: 2025-05-08 00:46:17.192 [INFO][4192] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" Namespace="calico-system" Pod="csi-node-driver-66j7s" WorkloadEndpoint="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:46:17.213947 env[1227]: 2025-05-08 00:46:17.192 [INFO][4192] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic101de8fe21 ContainerID="f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" Namespace="calico-system" Pod="csi-node-driver-66j7s" WorkloadEndpoint="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:46:17.213947 env[1227]: 2025-05-08 00:46:17.197 [INFO][4192] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" Namespace="calico-system" Pod="csi-node-driver-66j7s" WorkloadEndpoint="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:46:17.213947 env[1227]: 2025-05-08 00:46:17.198 [INFO][4192] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" Namespace="calico-system" Pod="csi-node-driver-66j7s" WorkloadEndpoint="localhost-k8s-csi--node--driver--66j7s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--66j7s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"72562622-3187-4bfb-96bf-cf9ba7859ac7", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2", Pod:"csi-node-driver-66j7s", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic101de8fe21", MAC:"5e:09:c2:49:2d:00", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:17.213947 env[1227]: 2025-05-08 00:46:17.211 [INFO][4192] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2" Namespace="calico-system" Pod="csi-node-driver-66j7s" WorkloadEndpoint="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:46:17.247730 env[1227]: time="2025-05-08T00:46:17.247633750Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:46:17.247730 env[1227]: time="2025-05-08T00:46:17.247689234Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:46:17.247730 env[1227]: time="2025-05-08T00:46:17.247701797Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:46:17.248001 env[1227]: time="2025-05-08T00:46:17.247877807Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2 pid=4257 runtime=io.containerd.runc.v2 May 8 00:46:17.251000 audit[4270]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=4270 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:46:17.251000 audit[4270]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7fff233cb640 a2=0 a3=7fff233cb62c items=0 ppid=3494 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.251000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:46:17.259999 systemd[1]: Started cri-containerd-f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2.scope. May 8 00:46:17.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit: BPF prog-id=174 op=LOAD May 8 00:46:17.271000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4257 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366132393136333263383939633336303336646337383133306431 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4257 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366132393136333263383939633336303336646337383133306431 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit: BPF prog-id=175 op=LOAD May 8 00:46:17.271000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023e4b0 items=0 ppid=4257 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366132393136333263383939633336303336646337383133306431 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.271000 audit: BPF prog-id=176 op=LOAD May 8 00:46:17.271000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023e4f8 items=0 ppid=4257 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366132393136333263383939633336303336646337383133306431 May 8 00:46:17.271000 audit: BPF prog-id=176 op=UNLOAD May 8 00:46:17.272000 audit: BPF prog-id=175 op=UNLOAD May 8 00:46:17.272000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.272000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.272000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.272000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.272000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.272000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.272000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.272000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.272000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.272000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.272000 audit: BPF prog-id=177 op=LOAD May 8 00:46:17.272000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023e908 items=0 ppid=4257 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366132393136333263383939633336303336646337383133306431 May 8 00:46:17.273674 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:46:17.285868 env[1227]: time="2025-05-08T00:46:17.285813790Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-66j7s,Uid:72562622-3187-4bfb-96bf-cf9ba7859ac7,Namespace:calico-system,Attempt:1,} returns sandbox id \"f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2\"" May 8 00:46:17.287790 env[1227]: time="2025-05-08T00:46:17.287765493Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 8 00:46:17.315305 systemd-networkd[1043]: calie9b7c753285: Link UP May 8 00:46:17.317560 systemd-networkd[1043]: calie9b7c753285: Gained carrier May 8 00:46:17.317937 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie9b7c753285: link becomes ready May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.066 [INFO][4204] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--7cskf-eth0 coredns-668d6bf9bc- kube-system f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04 1007 0 2025-05-08 00:45:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-7cskf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie9b7c753285 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-7cskf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7cskf-" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.066 [INFO][4204] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-7cskf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.112 [INFO][4229] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" HandleID="k8s-pod-network.59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.277 [INFO][4229] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" HandleID="k8s-pod-network.59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00042d350), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-7cskf", "timestamp":"2025-05-08 00:46:17.112392368 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.277 [INFO][4229] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.277 [INFO][4229] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.277 [INFO][4229] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.280 [INFO][4229] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" host="localhost" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.284 [INFO][4229] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.289 [INFO][4229] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.291 [INFO][4229] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.293 [INFO][4229] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.293 [INFO][4229] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" host="localhost" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.294 [INFO][4229] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.301 [INFO][4229] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" host="localhost" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.310 [INFO][4229] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" host="localhost" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.310 [INFO][4229] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" host="localhost" May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.310 [INFO][4229] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:17.334503 env[1227]: 2025-05-08 00:46:17.310 [INFO][4229] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" HandleID="k8s-pod-network.59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:46:17.335190 env[1227]: 2025-05-08 00:46:17.312 [INFO][4204] cni-plugin/k8s.go 386: Populated endpoint ContainerID="59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-7cskf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--7cskf-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-7cskf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9b7c753285", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:17.335190 env[1227]: 2025-05-08 00:46:17.312 [INFO][4204] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-7cskf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:46:17.335190 env[1227]: 2025-05-08 00:46:17.312 [INFO][4204] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie9b7c753285 ContainerID="59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-7cskf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:46:17.335190 env[1227]: 2025-05-08 00:46:17.317 [INFO][4204] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-7cskf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:46:17.335190 env[1227]: 2025-05-08 00:46:17.318 [INFO][4204] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-7cskf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--7cskf-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc", Pod:"coredns-668d6bf9bc-7cskf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9b7c753285", MAC:"9a:88:e2:85:71:97", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:17.335190 env[1227]: 2025-05-08 00:46:17.329 [INFO][4204] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-7cskf" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:46:17.345000 audit[4309]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=4309 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:46:17.345000 audit[4309]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffc37892a90 a2=0 a3=7ffc37892a7c items=0 ppid=3494 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.345000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:46:17.351584 env[1227]: time="2025-05-08T00:46:17.351489216Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:46:17.351584 env[1227]: time="2025-05-08T00:46:17.351526115Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:46:17.351584 env[1227]: time="2025-05-08T00:46:17.351535723Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:46:17.352016 env[1227]: time="2025-05-08T00:46:17.351975466Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc pid=4317 runtime=io.containerd.runc.v2 May 8 00:46:17.362528 systemd[1]: Started cri-containerd-59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc.scope. May 8 00:46:17.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit: BPF prog-id=178 op=LOAD May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4317 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539646535623765383161303737633866633366623839653734366330 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4317 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539646535623765383161303737633866633366623839653734366330 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit: BPF prog-id=179 op=LOAD May 8 00:46:17.373000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000220f00 items=0 ppid=4317 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539646535623765383161303737633866633366623839653734366330 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit: BPF prog-id=180 op=LOAD May 8 00:46:17.373000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000220f48 items=0 ppid=4317 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539646535623765383161303737633866633366623839653734366330 May 8 00:46:17.373000 audit: BPF prog-id=180 op=UNLOAD May 8 00:46:17.373000 audit: BPF prog-id=179 op=UNLOAD May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.373000 audit: BPF prog-id=181 op=LOAD May 8 00:46:17.373000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221358 items=0 ppid=4317 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539646535623765383161303737633866633366623839653734366330 May 8 00:46:17.376062 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:46:17.399103 env[1227]: time="2025-05-08T00:46:17.398509260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-7cskf,Uid:f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04,Namespace:kube-system,Attempt:1,} returns sandbox id \"59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc\"" May 8 00:46:17.399318 kubelet[1998]: E0508 00:46:17.399079 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:17.401172 env[1227]: time="2025-05-08T00:46:17.401096892Z" level=info msg="CreateContainer within sandbox \"59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 8 00:46:17.427107 env[1227]: time="2025-05-08T00:46:17.427041215Z" level=info msg="CreateContainer within sandbox \"59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8149a9cabb8cd30db6a453da1c31f97da6a77071f5305c809cc6a2f0491bd178\"" May 8 00:46:17.427692 env[1227]: time="2025-05-08T00:46:17.427664061Z" level=info msg="StartContainer for \"8149a9cabb8cd30db6a453da1c31f97da6a77071f5305c809cc6a2f0491bd178\"" May 8 00:46:17.442835 systemd[1]: Started cri-containerd-8149a9cabb8cd30db6a453da1c31f97da6a77071f5305c809cc6a2f0491bd178.scope. May 8 00:46:17.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.453000 audit: BPF prog-id=182 op=LOAD May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4317 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831343961396361626238636433306462366134353364613163333166 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4317 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831343961396361626238636433306462366134353364613163333166 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit: BPF prog-id=183 op=LOAD May 8 00:46:17.454000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098e00 items=0 ppid=4317 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831343961396361626238636433306462366134353364613163333166 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit: BPF prog-id=184 op=LOAD May 8 00:46:17.454000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098e48 items=0 ppid=4317 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831343961396361626238636433306462366134353364613163333166 May 8 00:46:17.454000 audit: BPF prog-id=184 op=UNLOAD May 8 00:46:17.454000 audit: BPF prog-id=183 op=UNLOAD May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.454000 audit: BPF prog-id=185 op=LOAD May 8 00:46:17.454000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099258 items=0 ppid=4317 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831343961396361626238636433306462366134353364613163333166 May 8 00:46:17.469436 env[1227]: time="2025-05-08T00:46:17.469379567Z" level=info msg="StartContainer for \"8149a9cabb8cd30db6a453da1c31f97da6a77071f5305c809cc6a2f0491bd178\" returns successfully" May 8 00:46:17.483000 audit[4368]: AVC avc: denied { getattr } for pid=4368 comm="coredns" path="cgroup:[4026532551]" dev="nsfs" ino=4026532551 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c367 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 8 00:46:17.483000 audit[4368]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a828 a2=c0000e2fa8 a3=0 items=0 ppid=4317 pid=4368 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c367 key=(null) May 8 00:46:17.483000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 8 00:46:17.555497 env[1227]: time="2025-05-08T00:46:17.555407982Z" level=info msg="StopPodSandbox for \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\"" May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.605 [INFO][4405] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.605 [INFO][4405] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" iface="eth0" netns="/var/run/netns/cni-ae355f5b-fed0-98ed-bc1d-24cb3e0cc41d" May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.605 [INFO][4405] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" iface="eth0" netns="/var/run/netns/cni-ae355f5b-fed0-98ed-bc1d-24cb3e0cc41d" May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.606 [INFO][4405] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" iface="eth0" netns="/var/run/netns/cni-ae355f5b-fed0-98ed-bc1d-24cb3e0cc41d" May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.606 [INFO][4405] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.606 [INFO][4405] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.632 [INFO][4415] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" HandleID="k8s-pod-network.32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.633 [INFO][4415] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.633 [INFO][4415] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.640 [WARNING][4415] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" HandleID="k8s-pod-network.32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.640 [INFO][4415] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" HandleID="k8s-pod-network.32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.642 [INFO][4415] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:17.645677 env[1227]: 2025-05-08 00:46:17.643 [INFO][4405] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:46:17.646354 env[1227]: time="2025-05-08T00:46:17.645792279Z" level=info msg="TearDown network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\" successfully" May 8 00:46:17.646354 env[1227]: time="2025-05-08T00:46:17.645826453Z" level=info msg="StopPodSandbox for \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\" returns successfully" May 8 00:46:17.646663 env[1227]: time="2025-05-08T00:46:17.646633232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66cc78549b-xt5vk,Uid:dcfdef5f-11b3-449f-a87e-841d4ef18553,Namespace:calico-apiserver,Attempt:1,}" May 8 00:46:17.771319 systemd-networkd[1043]: calicbf3ae5c832: Link UP May 8 00:46:17.773037 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicbf3ae5c832: link becomes ready May 8 00:46:17.773032 systemd-networkd[1043]: calicbf3ae5c832: Gained carrier May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.693 [INFO][4427] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0 calico-apiserver-66cc78549b- calico-apiserver dcfdef5f-11b3-449f-a87e-841d4ef18553 1025 0 2025-05-08 00:45:27 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:66cc78549b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-66cc78549b-xt5vk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calicbf3ae5c832 [] []}} ContainerID="eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-xt5vk" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.693 [INFO][4427] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-xt5vk" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.724 [INFO][4442] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" HandleID="k8s-pod-network.eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.735 [INFO][4442] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" HandleID="k8s-pod-network.eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ffe90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-66cc78549b-xt5vk", "timestamp":"2025-05-08 00:46:17.724244405 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.736 [INFO][4442] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.736 [INFO][4442] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.736 [INFO][4442] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.738 [INFO][4442] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" host="localhost" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.742 [INFO][4442] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.746 [INFO][4442] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.748 [INFO][4442] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.751 [INFO][4442] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.751 [INFO][4442] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" host="localhost" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.753 [INFO][4442] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62 May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.757 [INFO][4442] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" host="localhost" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.763 [INFO][4442] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" host="localhost" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.763 [INFO][4442] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" host="localhost" May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.763 [INFO][4442] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:17.789046 env[1227]: 2025-05-08 00:46:17.763 [INFO][4442] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" HandleID="k8s-pod-network.eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:46:17.790234 env[1227]: 2025-05-08 00:46:17.769 [INFO][4427] cni-plugin/k8s.go 386: Populated endpoint ContainerID="eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-xt5vk" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0", GenerateName:"calico-apiserver-66cc78549b-", Namespace:"calico-apiserver", SelfLink:"", UID:"dcfdef5f-11b3-449f-a87e-841d4ef18553", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66cc78549b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-66cc78549b-xt5vk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicbf3ae5c832", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:17.790234 env[1227]: 2025-05-08 00:46:17.769 [INFO][4427] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-xt5vk" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:46:17.790234 env[1227]: 2025-05-08 00:46:17.769 [INFO][4427] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicbf3ae5c832 ContainerID="eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-xt5vk" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:46:17.790234 env[1227]: 2025-05-08 00:46:17.774 [INFO][4427] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-xt5vk" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:46:17.790234 env[1227]: 2025-05-08 00:46:17.774 [INFO][4427] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-xt5vk" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0", GenerateName:"calico-apiserver-66cc78549b-", Namespace:"calico-apiserver", SelfLink:"", UID:"dcfdef5f-11b3-449f-a87e-841d4ef18553", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66cc78549b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62", Pod:"calico-apiserver-66cc78549b-xt5vk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicbf3ae5c832", MAC:"3a:a3:cc:ab:e7:d7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:17.790234 env[1227]: 2025-05-08 00:46:17.786 [INFO][4427] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-xt5vk" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:46:17.798000 audit[4466]: NETFILTER_CFG table=filter:109 family=2 entries=62 op=nft_register_chain pid=4466 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:46:17.798000 audit[4466]: SYSCALL arch=c000003e syscall=46 success=yes exit=31096 a0=3 a1=7ffc5558cfa0 a2=0 a3=7ffc5558cf8c items=0 ppid=3494 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.798000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:46:17.803446 env[1227]: time="2025-05-08T00:46:17.803355354Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:46:17.803446 env[1227]: time="2025-05-08T00:46:17.803409415Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:46:17.803446 env[1227]: time="2025-05-08T00:46:17.803420235Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:46:17.803860 env[1227]: time="2025-05-08T00:46:17.803694148Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62 pid=4474 runtime=io.containerd.runc.v2 May 8 00:46:17.816714 systemd[1]: Started cri-containerd-eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62.scope. May 8 00:46:17.832553 systemd[1]: run-netns-cni\x2dae355f5b\x2dfed0\x2d98ed\x2dbc1d\x2d24cb3e0cc41d.mount: Deactivated successfully. May 8 00:46:17.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.838000 audit: BPF prog-id=186 op=LOAD May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4474 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565656161393534633963656335613764636162653735353536386434 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4474 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565656161393534633963656335613764636162653735353536386434 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit: BPF prog-id=187 op=LOAD May 8 00:46:17.839000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000221370 items=0 ppid=4474 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565656161393534633963656335613764636162653735353536386434 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit: BPF prog-id=188 op=LOAD May 8 00:46:17.839000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002213b8 items=0 ppid=4474 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565656161393534633963656335613764636162653735353536386434 May 8 00:46:17.839000 audit: BPF prog-id=188 op=UNLOAD May 8 00:46:17.839000 audit: BPF prog-id=187 op=UNLOAD May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:17.839000 audit: BPF prog-id=189 op=LOAD May 8 00:46:17.839000 audit[4484]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002217c8 items=0 ppid=4474 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565656161393534633963656335613764636162653735353536386434 May 8 00:46:17.841361 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:46:17.867409 env[1227]: time="2025-05-08T00:46:17.867348682Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66cc78549b-xt5vk,Uid:dcfdef5f-11b3-449f-a87e-841d4ef18553,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62\"" May 8 00:46:17.936105 kubelet[1998]: E0508 00:46:17.935673 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:17.946974 kubelet[1998]: I0508 00:46:17.946538 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-7cskf" podStartSLOduration=58.946517649 podStartE2EDuration="58.946517649s" podCreationTimestamp="2025-05-08 00:45:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-08 00:46:17.94619203 +0000 UTC m=+65.506052320" watchObservedRunningTime="2025-05-08 00:46:17.946517649 +0000 UTC m=+65.506377949" May 8 00:46:17.963000 audit[4508]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:17.963000 audit[4508]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffddcd44af0 a2=0 a3=7ffddcd44adc items=0 ppid=2184 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:17.969000 audit[4508]: NETFILTER_CFG table=nat:111 family=2 entries=44 op=nft_register_rule pid=4508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:17.969000 audit[4508]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffddcd44af0 a2=0 a3=7ffddcd44adc items=0 ppid=2184 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:17.999000 audit[4510]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:17.999000 audit[4510]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff02ff45e0 a2=0 a3=7fff02ff45cc items=0 ppid=2184 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:17.999000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:18.014000 audit[4510]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=4510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:18.014000 audit[4510]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff02ff45e0 a2=0 a3=7fff02ff45cc items=0 ppid=2184 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:18.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:18.398151 systemd-networkd[1043]: calie9b7c753285: Gained IPv6LL May 8 00:46:18.718217 systemd-networkd[1043]: calic101de8fe21: Gained IPv6LL May 8 00:46:18.941057 kubelet[1998]: E0508 00:46:18.941020 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:19.038200 systemd-networkd[1043]: calicbf3ae5c832: Gained IPv6LL May 8 00:46:19.446982 env[1227]: time="2025-05-08T00:46:19.446818842Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:19.449215 env[1227]: time="2025-05-08T00:46:19.449183267Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:19.450946 env[1227]: time="2025-05-08T00:46:19.450901982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:19.452968 env[1227]: time="2025-05-08T00:46:19.452938222Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:19.453484 env[1227]: time="2025-05-08T00:46:19.453444421Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 8 00:46:19.454718 env[1227]: time="2025-05-08T00:46:19.454690368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:46:19.455811 env[1227]: time="2025-05-08T00:46:19.455780623Z" level=info msg="CreateContainer within sandbox \"f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 8 00:46:19.474160 env[1227]: time="2025-05-08T00:46:19.474100468Z" level=info msg="CreateContainer within sandbox \"f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"17a5f530cacb469278516b3104d9b9b0f8142fb457059c801b3578ebaf9262f4\"" May 8 00:46:19.474675 env[1227]: time="2025-05-08T00:46:19.474647564Z" level=info msg="StartContainer for \"17a5f530cacb469278516b3104d9b9b0f8142fb457059c801b3578ebaf9262f4\"" May 8 00:46:19.496233 systemd[1]: Started cri-containerd-17a5f530cacb469278516b3104d9b9b0f8142fb457059c801b3578ebaf9262f4.scope. May 8 00:46:19.510000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.510000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f35a247c588 items=0 ppid=4257 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:19.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613566353330636163623436393237383531366233313034643962 May 8 00:46:19.510000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.510000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.510000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.510000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.510000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.510000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.510000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.510000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.510000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.510000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.510000 audit: BPF prog-id=190 op=LOAD May 8 00:46:19.510000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00039aaf8 items=0 ppid=4257 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:19.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613566353330636163623436393237383531366233313034643962 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit: BPF prog-id=191 op=LOAD May 8 00:46:19.511000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00039ab48 items=0 ppid=4257 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:19.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613566353330636163623436393237383531366233313034643962 May 8 00:46:19.511000 audit: BPF prog-id=191 op=UNLOAD May 8 00:46:19.511000 audit: BPF prog-id=190 op=UNLOAD May 8 00:46:19.511000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:19.511000 audit: BPF prog-id=192 op=LOAD May 8 00:46:19.511000 audit[4521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00039abd8 items=0 ppid=4257 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:19.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137613566353330636163623436393237383531366233313034643962 May 8 00:46:19.563204 env[1227]: time="2025-05-08T00:46:19.563129118Z" level=info msg="StartContainer for \"17a5f530cacb469278516b3104d9b9b0f8142fb457059c801b3578ebaf9262f4\" returns successfully" May 8 00:46:19.952366 kubelet[1998]: E0508 00:46:19.952312 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:20.554613 env[1227]: time="2025-05-08T00:46:20.554561425Z" level=info msg="StopPodSandbox for \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\"" May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.605 [INFO][4566] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.606 [INFO][4566] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" iface="eth0" netns="/var/run/netns/cni-d381c1df-857c-5027-a6d7-07c947ebbe9a" May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.606 [INFO][4566] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" iface="eth0" netns="/var/run/netns/cni-d381c1df-857c-5027-a6d7-07c947ebbe9a" May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.606 [INFO][4566] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" iface="eth0" netns="/var/run/netns/cni-d381c1df-857c-5027-a6d7-07c947ebbe9a" May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.606 [INFO][4566] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.606 [INFO][4566] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.635 [INFO][4575] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" HandleID="k8s-pod-network.a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.635 [INFO][4575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.635 [INFO][4575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.642 [WARNING][4575] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" HandleID="k8s-pod-network.a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.642 [INFO][4575] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" HandleID="k8s-pod-network.a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.644 [INFO][4575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:20.647576 env[1227]: 2025-05-08 00:46:20.646 [INFO][4566] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:46:20.648243 env[1227]: time="2025-05-08T00:46:20.647738342Z" level=info msg="TearDown network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\" successfully" May 8 00:46:20.648243 env[1227]: time="2025-05-08T00:46:20.647777876Z" level=info msg="StopPodSandbox for \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\" returns successfully" May 8 00:46:20.650713 env[1227]: time="2025-05-08T00:46:20.650661231Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66cc78549b-4fpbh,Uid:467966ee-a4de-41f5-a742-c83abaf9be78,Namespace:calico-apiserver,Attempt:1,}" May 8 00:46:20.651238 systemd[1]: run-netns-cni\x2dd381c1df\x2d857c\x2d5027\x2da6d7\x2d07c947ebbe9a.mount: Deactivated successfully. May 8 00:46:20.870504 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:46:20.870622 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic36b60c394f: link becomes ready May 8 00:46:20.866808 systemd-networkd[1043]: calic36b60c394f: Link UP May 8 00:46:20.870566 systemd-networkd[1043]: calic36b60c394f: Gained carrier May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.702 [INFO][4582] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0 calico-apiserver-66cc78549b- calico-apiserver 467966ee-a4de-41f5-a742-c83abaf9be78 1051 0 2025-05-08 00:45:27 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:66cc78549b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-66cc78549b-4fpbh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic36b60c394f [] []}} ContainerID="61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-4fpbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.702 [INFO][4582] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-4fpbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.733 [INFO][4596] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" HandleID="k8s-pod-network.61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.742 [INFO][4596] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" HandleID="k8s-pod-network.61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f4120), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-66cc78549b-4fpbh", "timestamp":"2025-05-08 00:46:20.733085586 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.742 [INFO][4596] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.742 [INFO][4596] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.742 [INFO][4596] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.744 [INFO][4596] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" host="localhost" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.749 [INFO][4596] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.757 [INFO][4596] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.759 [INFO][4596] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.761 [INFO][4596] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.761 [INFO][4596] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" host="localhost" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.762 [INFO][4596] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.796 [INFO][4596] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" host="localhost" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.862 [INFO][4596] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" host="localhost" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.862 [INFO][4596] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" host="localhost" May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.862 [INFO][4596] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:46:20.897173 env[1227]: 2025-05-08 00:46:20.862 [INFO][4596] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" HandleID="k8s-pod-network.61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:46:20.898133 env[1227]: 2025-05-08 00:46:20.864 [INFO][4582] cni-plugin/k8s.go 386: Populated endpoint ContainerID="61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-4fpbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0", GenerateName:"calico-apiserver-66cc78549b-", Namespace:"calico-apiserver", SelfLink:"", UID:"467966ee-a4de-41f5-a742-c83abaf9be78", ResourceVersion:"1051", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66cc78549b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-66cc78549b-4fpbh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic36b60c394f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:20.898133 env[1227]: 2025-05-08 00:46:20.864 [INFO][4582] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-4fpbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:46:20.898133 env[1227]: 2025-05-08 00:46:20.864 [INFO][4582] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic36b60c394f ContainerID="61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-4fpbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:46:20.898133 env[1227]: 2025-05-08 00:46:20.867 [INFO][4582] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-4fpbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:46:20.898133 env[1227]: 2025-05-08 00:46:20.871 [INFO][4582] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-4fpbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0", GenerateName:"calico-apiserver-66cc78549b-", Namespace:"calico-apiserver", SelfLink:"", UID:"467966ee-a4de-41f5-a742-c83abaf9be78", ResourceVersion:"1051", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66cc78549b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b", Pod:"calico-apiserver-66cc78549b-4fpbh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic36b60c394f", MAC:"f6:b0:9a:c1:27:ff", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:46:20.898133 env[1227]: 2025-05-08 00:46:20.895 [INFO][4582] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b" Namespace="calico-apiserver" Pod="calico-apiserver-66cc78549b-4fpbh" WorkloadEndpoint="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:46:20.907000 audit[4612]: NETFILTER_CFG table=filter:114 family=2 entries=38 op=nft_register_chain pid=4612 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:46:20.912699 kernel: kauditd_printk_skb: 318 callbacks suppressed May 8 00:46:20.912796 kernel: audit: type=1325 audit(1746665180.907:1343): table=filter:114 family=2 entries=38 op=nft_register_chain pid=4612 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:46:20.907000 audit[4612]: SYSCALL arch=c000003e syscall=46 success=yes exit=21536 a0=3 a1=7fffe1372650 a2=0 a3=7fffe137263c items=0 ppid=3494 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:20.938507 env[1227]: time="2025-05-08T00:46:20.937643977Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:46:20.938507 env[1227]: time="2025-05-08T00:46:20.937692508Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:46:20.938507 env[1227]: time="2025-05-08T00:46:20.937730139Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:46:20.944766 kernel: audit: type=1300 audit(1746665180.907:1343): arch=c000003e syscall=46 success=yes exit=21536 a0=3 a1=7fffe1372650 a2=0 a3=7fffe137263c items=0 ppid=3494 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:20.944812 kernel: audit: type=1327 audit(1746665180.907:1343): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:46:20.907000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:46:20.945030 env[1227]: time="2025-05-08T00:46:20.937946625Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b pid=4626 runtime=io.containerd.runc.v2 May 8 00:46:20.960188 systemd[1]: Started cri-containerd-61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b.scope. May 8 00:46:20.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988534 kernel: audit: type=1400 audit(1746665180.975:1344): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988632 kernel: audit: type=1400 audit(1746665180.975:1345): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.995265 kernel: audit: type=1400 audit(1746665180.975:1346): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:21.004996 kernel: audit: type=1400 audit(1746665180.975:1347): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:21.011589 kernel: audit: type=1400 audit(1746665180.975:1348): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:21.011986 kernel: audit: type=1400 audit(1746665180.975:1349): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:21.011951 systemd-resolved[1158]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:46:20.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:21.029963 kernel: audit: type=1400 audit(1746665180.975:1350): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.987000 audit: BPF prog-id=193 op=LOAD May 8 00:46:20.988000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit[4636]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4626 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:20.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631626337376137633761663861366231656337356563343735323633 May 8 00:46:20.988000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit[4636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=4626 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:20.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631626337376137633761663861366231656337356563343735323633 May 8 00:46:20.988000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.988000 audit: BPF prog-id=194 op=LOAD May 8 00:46:20.988000 audit[4636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003b4d20 items=0 ppid=4626 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:20.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631626337376137633761663861366231656337356563343735323633 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit: BPF prog-id=195 op=LOAD May 8 00:46:20.994000 audit[4636]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0003b4d68 items=0 ppid=4626 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:20.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631626337376137633761663861366231656337356563343735323633 May 8 00:46:20.994000 audit: BPF prog-id=195 op=UNLOAD May 8 00:46:20.994000 audit: BPF prog-id=194 op=UNLOAD May 8 00:46:20.994000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { perfmon } for pid=4636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit[4636]: AVC avc: denied { bpf } for pid=4636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:20.994000 audit: BPF prog-id=196 op=LOAD May 8 00:46:20.994000 audit[4636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003b5178 items=0 ppid=4626 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:20.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631626337376137633761663861366231656337356563343735323633 May 8 00:46:21.047408 env[1227]: time="2025-05-08T00:46:21.047266361Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66cc78549b-4fpbh,Uid:467966ee-a4de-41f5-a742-c83abaf9be78,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b\"" May 8 00:46:21.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.60:22-10.0.0.1:57122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:21.066433 systemd[1]: Started sshd@16-10.0.0.60:22-10.0.0.1:57122.service. May 8 00:46:21.113000 audit[4662]: USER_ACCT pid=4662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:21.114361 sshd[4662]: Accepted publickey for core from 10.0.0.1 port 57122 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:21.114000 audit[4662]: CRED_ACQ pid=4662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:21.114000 audit[4662]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff53015790 a2=3 a3=0 items=0 ppid=1 pid=4662 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:21.114000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:21.116032 sshd[4662]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:21.120567 systemd-logind[1208]: New session 17 of user core. May 8 00:46:21.121429 systemd[1]: Started session-17.scope. May 8 00:46:21.128000 audit[4662]: USER_START pid=4662 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:21.129000 audit[4664]: CRED_ACQ pid=4664 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:21.628610 sshd[4662]: pam_unix(sshd:session): session closed for user core May 8 00:46:21.628000 audit[4662]: USER_END pid=4662 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:21.628000 audit[4662]: CRED_DISP pid=4662 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:21.631297 systemd[1]: sshd@16-10.0.0.60:22-10.0.0.1:57122.service: Deactivated successfully. May 8 00:46:21.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.60:22-10.0.0.1:57122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:21.632371 systemd[1]: session-17.scope: Deactivated successfully. May 8 00:46:21.633067 systemd-logind[1208]: Session 17 logged out. Waiting for processes to exit. May 8 00:46:21.633746 systemd-logind[1208]: Removed session 17. May 8 00:46:22.569969 systemd-networkd[1043]: calic36b60c394f: Gained IPv6LL May 8 00:46:23.567608 env[1227]: time="2025-05-08T00:46:23.567492528Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:23.578108 env[1227]: time="2025-05-08T00:46:23.578024508Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:23.586448 env[1227]: time="2025-05-08T00:46:23.586367775Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:23.597377 env[1227]: time="2025-05-08T00:46:23.597310909Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:23.597995 env[1227]: time="2025-05-08T00:46:23.597955685Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 8 00:46:23.599664 env[1227]: time="2025-05-08T00:46:23.599621442Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 8 00:46:23.600106 env[1227]: time="2025-05-08T00:46:23.600060660Z" level=info msg="CreateContainer within sandbox \"eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:46:23.644438 env[1227]: time="2025-05-08T00:46:23.644321409Z" level=info msg="CreateContainer within sandbox \"eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"6e000f1f9d8db62596c74415e7173c30fef9235401a3a14213432953a7f2d356\"" May 8 00:46:23.645814 env[1227]: time="2025-05-08T00:46:23.645752685Z" level=info msg="StartContainer for \"6e000f1f9d8db62596c74415e7173c30fef9235401a3a14213432953a7f2d356\"" May 8 00:46:23.672367 systemd[1]: run-containerd-runc-k8s.io-6e000f1f9d8db62596c74415e7173c30fef9235401a3a14213432953a7f2d356-runc.Er21Vp.mount: Deactivated successfully. May 8 00:46:23.674758 systemd[1]: Started cri-containerd-6e000f1f9d8db62596c74415e7173c30fef9235401a3a14213432953a7f2d356.scope. May 8 00:46:23.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit: BPF prog-id=197 op=LOAD May 8 00:46:23.687000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4474 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:23.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665303030663166396438646236323539366337343431356537313733 May 8 00:46:23.687000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.687000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4474 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:23.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665303030663166396438646236323539366337343431356537313733 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit: BPF prog-id=198 op=LOAD May 8 00:46:23.688000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a8050 items=0 ppid=4474 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:23.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665303030663166396438646236323539366337343431356537313733 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit: BPF prog-id=199 op=LOAD May 8 00:46:23.688000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a8098 items=0 ppid=4474 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:23.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665303030663166396438646236323539366337343431356537313733 May 8 00:46:23.688000 audit: BPF prog-id=199 op=UNLOAD May 8 00:46:23.688000 audit: BPF prog-id=198 op=UNLOAD May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:23.688000 audit: BPF prog-id=200 op=LOAD May 8 00:46:23.688000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a84a8 items=0 ppid=4474 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:23.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665303030663166396438646236323539366337343431356537313733 May 8 00:46:23.724402 env[1227]: time="2025-05-08T00:46:23.724329538Z" level=info msg="StartContainer for \"6e000f1f9d8db62596c74415e7173c30fef9235401a3a14213432953a7f2d356\" returns successfully" May 8 00:46:24.051277 kubelet[1998]: I0508 00:46:24.051131 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-66cc78549b-xt5vk" podStartSLOduration=51.321113489 podStartE2EDuration="57.051107928s" podCreationTimestamp="2025-05-08 00:45:27 +0000 UTC" firstStartedPulling="2025-05-08 00:46:17.86893466 +0000 UTC m=+65.428794960" lastFinishedPulling="2025-05-08 00:46:23.598929089 +0000 UTC m=+71.158789399" observedRunningTime="2025-05-08 00:46:24.05056325 +0000 UTC m=+71.610423550" watchObservedRunningTime="2025-05-08 00:46:24.051107928 +0000 UTC m=+71.610968228" May 8 00:46:24.087000 audit[4714]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:24.087000 audit[4714]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc8be6c0e0 a2=0 a3=7ffc8be6c0cc items=0 ppid=2184 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:24.087000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:24.091000 audit[4714]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:24.091000 audit[4714]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc8be6c0e0 a2=0 a3=7ffc8be6c0cc items=0 ppid=2184 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:24.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:24.940000 audit[4692]: AVC avc: denied { watch } for pid=4692 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_45_49.1899676750/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c1000 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c383,c1000 tclass=file permissive=0 May 8 00:46:24.940000 audit[4692]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c2a5c0 a2=fc6 a3=0 items=0 ppid=4474 pid=4692 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c1000 key=(null) May 8 00:46:24.940000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:46:24.966684 kubelet[1998]: I0508 00:46:24.966641 1998 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:46:25.734084 env[1227]: time="2025-05-08T00:46:25.734017848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:25.739611 env[1227]: time="2025-05-08T00:46:25.739533579Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:25.745314 env[1227]: time="2025-05-08T00:46:25.745243005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:25.747898 env[1227]: time="2025-05-08T00:46:25.747823856Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:25.748502 env[1227]: time="2025-05-08T00:46:25.748454847Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 8 00:46:25.750101 env[1227]: time="2025-05-08T00:46:25.750051801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 8 00:46:25.752257 env[1227]: time="2025-05-08T00:46:25.752216998Z" level=info msg="CreateContainer within sandbox \"f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 8 00:46:25.772131 env[1227]: time="2025-05-08T00:46:25.772061663Z" level=info msg="CreateContainer within sandbox \"f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6fb127ff46f564ae4bc2c9a604163ba1c4805a8082df5cae605c2cf1c99fedad\"" May 8 00:46:25.772977 env[1227]: time="2025-05-08T00:46:25.772898152Z" level=info msg="StartContainer for \"6fb127ff46f564ae4bc2c9a604163ba1c4805a8082df5cae605c2cf1c99fedad\"" May 8 00:46:25.796372 systemd[1]: Started cri-containerd-6fb127ff46f564ae4bc2c9a604163ba1c4805a8082df5cae605c2cf1c99fedad.scope. May 8 00:46:25.811000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.811000 audit[4726]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f334fd652f8 items=0 ppid=4257 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:25.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666623132376666343666353634616534626332633961363034313633 May 8 00:46:25.811000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.811000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.811000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.811000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.811000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.811000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.811000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.811000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.811000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.811000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.811000 audit: BPF prog-id=201 op=LOAD May 8 00:46:25.811000 audit[4726]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0000249d8 items=0 ppid=4257 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:25.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666623132376666343666353634616534626332633961363034313633 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit: BPF prog-id=202 op=LOAD May 8 00:46:25.812000 audit[4726]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000024a28 items=0 ppid=4257 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:25.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666623132376666343666353634616534626332633961363034313633 May 8 00:46:25.812000 audit: BPF prog-id=202 op=UNLOAD May 8 00:46:25.812000 audit: BPF prog-id=201 op=UNLOAD May 8 00:46:25.812000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { perfmon } for pid=4726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit[4726]: AVC avc: denied { bpf } for pid=4726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:25.812000 audit: BPF prog-id=203 op=LOAD May 8 00:46:25.812000 audit[4726]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000024ab8 items=0 ppid=4257 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:25.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666623132376666343666353634616534626332633961363034313633 May 8 00:46:25.827288 env[1227]: time="2025-05-08T00:46:25.827215363Z" level=info msg="StartContainer for \"6fb127ff46f564ae4bc2c9a604163ba1c4805a8082df5cae605c2cf1c99fedad\" returns successfully" May 8 00:46:25.912443 kubelet[1998]: I0508 00:46:25.912391 1998 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 8 00:46:25.912844 kubelet[1998]: I0508 00:46:25.912470 1998 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 8 00:46:26.167659 env[1227]: time="2025-05-08T00:46:26.167567335Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:26.169600 env[1227]: time="2025-05-08T00:46:26.169559467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:26.171530 env[1227]: time="2025-05-08T00:46:26.171475207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:26.173136 env[1227]: time="2025-05-08T00:46:26.173091671Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:46:26.173682 env[1227]: time="2025-05-08T00:46:26.173643402Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 8 00:46:26.175969 env[1227]: time="2025-05-08T00:46:26.175874978Z" level=info msg="CreateContainer within sandbox \"61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 8 00:46:26.192571 env[1227]: time="2025-05-08T00:46:26.192502211Z" level=info msg="CreateContainer within sandbox \"61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"42fe12303c704a68e05a4314495909f6833ed22d8ab1dbac343367a391908dbf\"" May 8 00:46:26.193372 env[1227]: time="2025-05-08T00:46:26.193325887Z" level=info msg="StartContainer for \"42fe12303c704a68e05a4314495909f6833ed22d8ab1dbac343367a391908dbf\"" May 8 00:46:26.209773 systemd[1]: Started cri-containerd-42fe12303c704a68e05a4314495909f6833ed22d8ab1dbac343367a391908dbf.scope. May 8 00:46:26.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227545 kernel: kauditd_printk_skb: 170 callbacks suppressed May 8 00:46:26.227643 kernel: audit: type=1400 audit(1746665186.225:1398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.234126 kernel: audit: type=1400 audit(1746665186.225:1399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.234272 kernel: audit: type=1400 audit(1746665186.225:1400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.240489 kernel: audit: type=1400 audit(1746665186.225:1401): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.240649 kernel: audit: type=1400 audit(1746665186.225:1402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.251819 kernel: audit: type=1400 audit(1746665186.225:1403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.252153 kernel: audit: type=1400 audit(1746665186.225:1404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.252271 kernel: audit: type=1400 audit(1746665186.225:1405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.258916 kernel: audit: type=1400 audit(1746665186.225:1406): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.259069 kernel: audit: type=1400 audit(1746665186.226:1407): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.226000 audit: BPF prog-id=204 op=LOAD May 8 00:46:26.227000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4626 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:26.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432666531323330336337303461363865303561343331343439353930 May 8 00:46:26.227000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4626 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:26.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432666531323330336337303461363865303561343331343439353930 May 8 00:46:26.227000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.227000 audit: BPF prog-id=205 op=LOAD May 8 00:46:26.227000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000325b50 items=0 ppid=4626 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:26.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432666531323330336337303461363865303561343331343439353930 May 8 00:46:26.229000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.229000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.229000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.229000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.229000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.229000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.229000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.229000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.229000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.229000 audit: BPF prog-id=206 op=LOAD May 8 00:46:26.229000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000325b98 items=0 ppid=4626 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:26.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432666531323330336337303461363865303561343331343439353930 May 8 00:46:26.236000 audit: BPF prog-id=206 op=UNLOAD May 8 00:46:26.236000 audit: BPF prog-id=205 op=UNLOAD May 8 00:46:26.236000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.236000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.236000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.236000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.236000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.236000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.236000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.236000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.236000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.236000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:46:26.236000 audit: BPF prog-id=207 op=LOAD May 8 00:46:26.236000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000325fa8 items=0 ppid=4626 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:26.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432666531323330336337303461363865303561343331343439353930 May 8 00:46:26.286563 env[1227]: time="2025-05-08T00:46:26.286503926Z" level=info msg="StartContainer for \"42fe12303c704a68e05a4314495909f6833ed22d8ab1dbac343367a391908dbf\" returns successfully" May 8 00:46:26.635468 systemd[1]: Started sshd@17-10.0.0.60:22-10.0.0.1:45524.service. May 8 00:46:26.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.60:22-10.0.0.1:45524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:26.691000 audit[4797]: USER_ACCT pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:26.692806 sshd[4797]: Accepted publickey for core from 10.0.0.1 port 45524 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:26.692000 audit[4797]: CRED_ACQ pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:26.692000 audit[4797]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea8ae4120 a2=3 a3=0 items=0 ppid=1 pid=4797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:26.692000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:26.693985 sshd[4797]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:26.697834 systemd-logind[1208]: New session 18 of user core. May 8 00:46:26.698650 systemd[1]: Started session-18.scope. May 8 00:46:26.702000 audit[4797]: USER_START pid=4797 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:26.703000 audit[4799]: CRED_ACQ pid=4799 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:26.789093 kubelet[1998]: I0508 00:46:26.789055 1998 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 8 00:46:26.920035 kubelet[1998]: I0508 00:46:26.919854 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-66j7s" podStartSLOduration=51.457444818 podStartE2EDuration="59.919829626s" podCreationTimestamp="2025-05-08 00:45:27 +0000 UTC" firstStartedPulling="2025-05-08 00:46:17.287381805 +0000 UTC m=+64.847242105" lastFinishedPulling="2025-05-08 00:46:25.749766613 +0000 UTC m=+73.309626913" observedRunningTime="2025-05-08 00:46:26.056511551 +0000 UTC m=+73.616371851" watchObservedRunningTime="2025-05-08 00:46:26.919829626 +0000 UTC m=+74.479689936" May 8 00:46:26.959000 audit[4810]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:26.959000 audit[4810]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc4a449a60 a2=0 a3=7ffc4a449a4c items=0 ppid=2184 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:26.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:26.966000 audit[4810]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:26.966000 audit[4810]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc4a449a60 a2=0 a3=7ffc4a449a4c items=0 ppid=2184 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:26.966000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:27.046793 sshd[4797]: pam_unix(sshd:session): session closed for user core May 8 00:46:27.047000 audit[4797]: USER_END pid=4797 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:27.047000 audit[4797]: CRED_DISP pid=4797 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:27.049645 systemd[1]: sshd@17-10.0.0.60:22-10.0.0.1:45524.service: Deactivated successfully. May 8 00:46:27.050591 systemd[1]: session-18.scope: Deactivated successfully. May 8 00:46:27.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.60:22-10.0.0.1:45524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:27.051318 systemd-logind[1208]: Session 18 logged out. Waiting for processes to exit. May 8 00:46:27.052181 systemd-logind[1208]: Removed session 18. May 8 00:46:27.085000 audit[4813]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:27.085000 audit[4813]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe2aee57a0 a2=0 a3=7ffe2aee578c items=0 ppid=2184 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:27.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:27.091000 audit[4813]: NETFILTER_CFG table=nat:120 family=2 entries=30 op=nft_register_rule pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:27.091000 audit[4813]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe2aee57a0 a2=0 a3=7ffe2aee578c items=0 ppid=2184 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:27.091000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:28.163000 audit[4776]: AVC avc: denied { watch } for pid=4776 comm="apiserver" path="/calico-apiserver-certs/..2025_05_08_00_45_49.1854729463/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c489,c591 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c489,c591 tclass=file permissive=0 May 8 00:46:28.163000 audit[4776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0008a68a0 a2=fc6 a3=0 items=0 ppid=4626 pid=4776 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c489,c591 key=(null) May 8 00:46:28.163000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 8 00:46:28.310786 kubelet[1998]: I0508 00:46:28.310710 1998 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-66cc78549b-4fpbh" podStartSLOduration=56.185105738 podStartE2EDuration="1m1.310671031s" podCreationTimestamp="2025-05-08 00:45:27 +0000 UTC" firstStartedPulling="2025-05-08 00:46:21.0489409 +0000 UTC m=+68.608801200" lastFinishedPulling="2025-05-08 00:46:26.174506193 +0000 UTC m=+73.734366493" observedRunningTime="2025-05-08 00:46:27.07033877 +0000 UTC m=+74.630199070" watchObservedRunningTime="2025-05-08 00:46:28.310671031 +0000 UTC m=+75.870531331" May 8 00:46:28.342000 audit[4821]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:28.342000 audit[4821]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc803ed7f0 a2=0 a3=7ffc803ed7dc items=0 ppid=2184 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:28.342000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:28.351000 audit[4821]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=4821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:28.351000 audit[4821]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc803ed7f0 a2=0 a3=7ffc803ed7dc items=0 ppid=2184 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:28.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:32.051465 systemd[1]: Started sshd@18-10.0.0.60:22-10.0.0.1:45528.service. May 8 00:46:32.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.60:22-10.0.0.1:45528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:32.052621 kernel: kauditd_printk_skb: 79 callbacks suppressed May 8 00:46:32.052783 kernel: audit: type=1130 audit(1746665192.050:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.60:22-10.0.0.1:45528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:32.092000 audit[4825]: USER_ACCT pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:32.093231 sshd[4825]: Accepted publickey for core from 10.0.0.1 port 45528 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:32.095561 sshd[4825]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:32.094000 audit[4825]: CRED_ACQ pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:32.099627 systemd-logind[1208]: New session 19 of user core. May 8 00:46:32.100417 systemd[1]: Started session-19.scope. May 8 00:46:32.101315 kernel: audit: type=1101 audit(1746665192.092:1433): pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:32.101381 kernel: audit: type=1103 audit(1746665192.094:1434): pid=4825 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:32.101413 kernel: audit: type=1006 audit(1746665192.094:1435): pid=4825 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 8 00:46:32.094000 audit[4825]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd05a1360 a2=3 a3=0 items=0 ppid=1 pid=4825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:32.108277 kernel: audit: type=1300 audit(1746665192.094:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd05a1360 a2=3 a3=0 items=0 ppid=1 pid=4825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:32.108335 kernel: audit: type=1327 audit(1746665192.094:1435): proctitle=737368643A20636F7265205B707269765D May 8 00:46:32.094000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:32.103000 audit[4825]: USER_START pid=4825 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:32.114124 kernel: audit: type=1105 audit(1746665192.103:1436): pid=4825 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:32.114300 kernel: audit: type=1103 audit(1746665192.105:1437): pid=4827 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:32.105000 audit[4827]: CRED_ACQ pid=4827 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:33.000885 sshd[4825]: pam_unix(sshd:session): session closed for user core May 8 00:46:33.001000 audit[4825]: USER_END pid=4825 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:33.004459 systemd[1]: sshd@18-10.0.0.60:22-10.0.0.1:45528.service: Deactivated successfully. May 8 00:46:33.005472 systemd[1]: session-19.scope: Deactivated successfully. May 8 00:46:33.006624 systemd-logind[1208]: Session 19 logged out. Waiting for processes to exit. May 8 00:46:33.001000 audit[4825]: CRED_DISP pid=4825 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:33.007626 systemd-logind[1208]: Removed session 19. May 8 00:46:33.011844 kernel: audit: type=1106 audit(1746665193.001:1438): pid=4825 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:33.012053 kernel: audit: type=1104 audit(1746665193.001:1439): pid=4825 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:33.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.60:22-10.0.0.1:45528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:36.971596 kubelet[1998]: E0508 00:46:36.971532 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:38.005637 systemd[1]: Started sshd@19-10.0.0.60:22-10.0.0.1:42102.service. May 8 00:46:38.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.60:22-10.0.0.1:42102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:38.007050 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:46:38.007118 kernel: audit: type=1130 audit(1746665198.004:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.60:22-10.0.0.1:42102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:38.050000 audit[4865]: USER_ACCT pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.051777 sshd[4865]: Accepted publickey for core from 10.0.0.1 port 42102 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:38.056021 sshd[4865]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:38.054000 audit[4865]: CRED_ACQ pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.060371 systemd-logind[1208]: New session 20 of user core. May 8 00:46:38.060833 kernel: audit: type=1101 audit(1746665198.050:1442): pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.060869 kernel: audit: type=1103 audit(1746665198.054:1443): pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.060894 kernel: audit: type=1006 audit(1746665198.054:1444): pid=4865 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 8 00:46:38.061474 systemd[1]: Started session-20.scope. May 8 00:46:38.054000 audit[4865]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffa490d30 a2=3 a3=0 items=0 ppid=1 pid=4865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:38.068455 kernel: audit: type=1300 audit(1746665198.054:1444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffa490d30 a2=3 a3=0 items=0 ppid=1 pid=4865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:38.068521 kernel: audit: type=1327 audit(1746665198.054:1444): proctitle=737368643A20636F7265205B707269765D May 8 00:46:38.054000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:38.065000 audit[4865]: USER_START pid=4865 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.075356 kernel: audit: type=1105 audit(1746665198.065:1445): pid=4865 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.075405 kernel: audit: type=1103 audit(1746665198.066:1446): pid=4867 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.066000 audit[4867]: CRED_ACQ pid=4867 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.193751 sshd[4865]: pam_unix(sshd:session): session closed for user core May 8 00:46:38.194000 audit[4865]: USER_END pid=4865 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.196280 systemd[1]: sshd@19-10.0.0.60:22-10.0.0.1:42102.service: Deactivated successfully. May 8 00:46:38.197207 systemd[1]: session-20.scope: Deactivated successfully. May 8 00:46:38.194000 audit[4865]: CRED_DISP pid=4865 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.202553 systemd-logind[1208]: Session 20 logged out. Waiting for processes to exit. May 8 00:46:38.203535 systemd-logind[1208]: Removed session 20. May 8 00:46:38.203645 kernel: audit: type=1106 audit(1746665198.194:1447): pid=4865 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.203716 kernel: audit: type=1104 audit(1746665198.194:1448): pid=4865 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:38.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.60:22-10.0.0.1:42102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:39.554440 kubelet[1998]: E0508 00:46:39.554375 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:40.554279 kubelet[1998]: E0508 00:46:40.554229 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:43.199416 systemd[1]: Started sshd@20-10.0.0.60:22-10.0.0.1:42118.service. May 8 00:46:43.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.60:22-10.0.0.1:42118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:43.200651 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:46:43.200693 kernel: audit: type=1130 audit(1746665203.198:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.60:22-10.0.0.1:42118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:43.242000 audit[4901]: USER_ACCT pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.243879 sshd[4901]: Accepted publickey for core from 10.0.0.1 port 42118 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:43.247000 audit[4901]: CRED_ACQ pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.249156 sshd[4901]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:43.253545 kernel: audit: type=1101 audit(1746665203.242:1451): pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.253619 kernel: audit: type=1103 audit(1746665203.247:1452): pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.253637 kernel: audit: type=1006 audit(1746665203.247:1453): pid=4901 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 8 00:46:43.252892 systemd-logind[1208]: New session 21 of user core. May 8 00:46:43.253761 systemd[1]: Started session-21.scope. May 8 00:46:43.255813 kernel: audit: type=1300 audit(1746665203.247:1453): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6db435d0 a2=3 a3=0 items=0 ppid=1 pid=4901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:43.247000 audit[4901]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6db435d0 a2=3 a3=0 items=0 ppid=1 pid=4901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:43.247000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:43.262072 kernel: audit: type=1327 audit(1746665203.247:1453): proctitle=737368643A20636F7265205B707269765D May 8 00:46:43.262141 kernel: audit: type=1105 audit(1746665203.258:1454): pid=4901 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.258000 audit[4901]: USER_START pid=4901 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.259000 audit[4903]: CRED_ACQ pid=4903 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.271104 kernel: audit: type=1103 audit(1746665203.259:1455): pid=4903 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.401897 sshd[4901]: pam_unix(sshd:session): session closed for user core May 8 00:46:43.402000 audit[4901]: USER_END pid=4901 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.404967 systemd[1]: sshd@20-10.0.0.60:22-10.0.0.1:42118.service: Deactivated successfully. May 8 00:46:43.405564 systemd[1]: session-21.scope: Deactivated successfully. May 8 00:46:43.406153 systemd-logind[1208]: Session 21 logged out. Waiting for processes to exit. May 8 00:46:43.407370 systemd[1]: Started sshd@21-10.0.0.60:22-10.0.0.1:42132.service. May 8 00:46:43.408639 systemd-logind[1208]: Removed session 21. May 8 00:46:43.402000 audit[4901]: CRED_DISP pid=4901 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.414228 kernel: audit: type=1106 audit(1746665203.402:1456): pid=4901 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.414305 kernel: audit: type=1104 audit(1746665203.402:1457): pid=4901 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.60:22-10.0.0.1:42118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:43.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.60:22-10.0.0.1:42132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:43.445000 audit[4915]: USER_ACCT pid=4915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.446741 sshd[4915]: Accepted publickey for core from 10.0.0.1 port 42132 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:43.446000 audit[4915]: CRED_ACQ pid=4915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.446000 audit[4915]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff00fc9010 a2=3 a3=0 items=0 ppid=1 pid=4915 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:43.446000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:43.447765 sshd[4915]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:43.451411 systemd-logind[1208]: New session 22 of user core. May 8 00:46:43.452635 systemd[1]: Started session-22.scope. May 8 00:46:43.456000 audit[4915]: USER_START pid=4915 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:43.458000 audit[4917]: CRED_ACQ pid=4917 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:44.462540 sshd[4915]: pam_unix(sshd:session): session closed for user core May 8 00:46:44.462000 audit[4915]: USER_END pid=4915 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:44.463000 audit[4915]: CRED_DISP pid=4915 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:44.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.60:22-10.0.0.1:42136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:44.466963 systemd[1]: Started sshd@22-10.0.0.60:22-10.0.0.1:42136.service. May 8 00:46:44.467572 systemd[1]: sshd@21-10.0.0.60:22-10.0.0.1:42132.service: Deactivated successfully. May 8 00:46:44.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.60:22-10.0.0.1:42132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:44.468233 systemd[1]: session-22.scope: Deactivated successfully. May 8 00:46:44.468759 systemd-logind[1208]: Session 22 logged out. Waiting for processes to exit. May 8 00:46:44.469616 systemd-logind[1208]: Removed session 22. May 8 00:46:44.508000 audit[4926]: USER_ACCT pid=4926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:44.509548 sshd[4926]: Accepted publickey for core from 10.0.0.1 port 42136 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:44.509000 audit[4926]: CRED_ACQ pid=4926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:44.509000 audit[4926]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd0d380b0 a2=3 a3=0 items=0 ppid=1 pid=4926 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:44.509000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:44.511101 sshd[4926]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:44.515396 systemd-logind[1208]: New session 23 of user core. May 8 00:46:44.516457 systemd[1]: Started session-23.scope. May 8 00:46:44.519000 audit[4926]: USER_START pid=4926 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:44.521000 audit[4929]: CRED_ACQ pid=4929 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:45.357000 audit[4946]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=4946 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:45.357000 audit[4946]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcdb5d2950 a2=0 a3=7ffcdb5d293c items=0 ppid=2184 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:45.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:45.362000 audit[4946]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4946 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:45.362000 audit[4946]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcdb5d2950 a2=0 a3=0 items=0 ppid=2184 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:45.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:45.376795 sshd[4926]: pam_unix(sshd:session): session closed for user core May 8 00:46:45.376000 audit[4926]: USER_END pid=4926 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:45.376000 audit[4926]: CRED_DISP pid=4926 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:45.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.60:22-10.0.0.1:42136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:45.379625 systemd[1]: sshd@22-10.0.0.60:22-10.0.0.1:42136.service: Deactivated successfully. May 8 00:46:45.380941 systemd[1]: session-23.scope: Deactivated successfully. May 8 00:46:45.378000 audit[4949]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=4949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:45.378000 audit[4949]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd7cdb58e0 a2=0 a3=7ffd7cdb58cc items=0 ppid=2184 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:45.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:45.382178 systemd-logind[1208]: Session 23 logged out. Waiting for processes to exit. May 8 00:46:45.384497 systemd[1]: Started sshd@23-10.0.0.60:22-10.0.0.1:49410.service. May 8 00:46:45.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.60:22-10.0.0.1:49410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:45.385636 systemd-logind[1208]: Removed session 23. May 8 00:46:45.384000 audit[4949]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:45.384000 audit[4949]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd7cdb58e0 a2=0 a3=0 items=0 ppid=2184 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:45.384000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:45.422000 audit[4951]: USER_ACCT pid=4951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:45.425226 sshd[4951]: Accepted publickey for core from 10.0.0.1 port 49410 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:45.423000 audit[4951]: CRED_ACQ pid=4951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:45.423000 audit[4951]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5ca6dca0 a2=3 a3=0 items=0 ppid=1 pid=4951 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:45.423000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:45.426212 sshd[4951]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:45.430015 systemd-logind[1208]: New session 24 of user core. May 8 00:46:45.431232 systemd[1]: Started session-24.scope. May 8 00:46:45.433000 audit[4951]: USER_START pid=4951 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:45.436000 audit[4953]: CRED_ACQ pid=4953 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:46.368851 sshd[4951]: pam_unix(sshd:session): session closed for user core May 8 00:46:46.368000 audit[4951]: USER_END pid=4951 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:46.368000 audit[4951]: CRED_DISP pid=4951 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:46.372281 systemd[1]: sshd@23-10.0.0.60:22-10.0.0.1:49410.service: Deactivated successfully. May 8 00:46:46.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.60:22-10.0.0.1:49410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:46.373068 systemd[1]: session-24.scope: Deactivated successfully. May 8 00:46:46.373689 systemd-logind[1208]: Session 24 logged out. Waiting for processes to exit. May 8 00:46:46.375162 systemd[1]: Started sshd@24-10.0.0.60:22-10.0.0.1:49418.service. May 8 00:46:46.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.60:22-10.0.0.1:49418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:46.376237 systemd-logind[1208]: Removed session 24. May 8 00:46:46.414000 audit[4962]: USER_ACCT pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:46.417298 sshd[4962]: Accepted publickey for core from 10.0.0.1 port 49418 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:46.416000 audit[4962]: CRED_ACQ pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:46.416000 audit[4962]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc87274bc0 a2=3 a3=0 items=0 ppid=1 pid=4962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:46.416000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:46.418284 sshd[4962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:46.422488 systemd-logind[1208]: New session 25 of user core. May 8 00:46:46.423324 systemd[1]: Started session-25.scope. May 8 00:46:46.426000 audit[4962]: USER_START pid=4962 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:46.427000 audit[4964]: CRED_ACQ pid=4964 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:46.691696 sshd[4962]: pam_unix(sshd:session): session closed for user core May 8 00:46:46.691000 audit[4962]: USER_END pid=4962 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:46.691000 audit[4962]: CRED_DISP pid=4962 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:46.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.60:22-10.0.0.1:49418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:46.694737 systemd[1]: sshd@24-10.0.0.60:22-10.0.0.1:49418.service: Deactivated successfully. May 8 00:46:46.695736 systemd[1]: session-25.scope: Deactivated successfully. May 8 00:46:46.696356 systemd-logind[1208]: Session 25 logged out. Waiting for processes to exit. May 8 00:46:46.697093 systemd-logind[1208]: Removed session 25. May 8 00:46:48.554585 kubelet[1998]: E0508 00:46:48.554522 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:51.698082 systemd[1]: Started sshd@25-10.0.0.60:22-10.0.0.1:49424.service. May 8 00:46:51.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.60:22-10.0.0.1:49424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:51.708504 kernel: kauditd_printk_skb: 57 callbacks suppressed May 8 00:46:51.708679 kernel: audit: type=1130 audit(1746665211.697:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.60:22-10.0.0.1:49424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:51.742000 audit[4984]: USER_ACCT pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.743331 sshd[4984]: Accepted publickey for core from 10.0.0.1 port 49424 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:51.744858 sshd[4984]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:51.743000 audit[4984]: CRED_ACQ pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.749681 systemd-logind[1208]: New session 26 of user core. May 8 00:46:51.750579 systemd[1]: Started session-26.scope. May 8 00:46:51.755779 kernel: audit: type=1101 audit(1746665211.742:1500): pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.755894 kernel: audit: type=1103 audit(1746665211.743:1501): pid=4984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.755964 kernel: audit: type=1006 audit(1746665211.743:1502): pid=4984 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 8 00:46:51.743000 audit[4984]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc82247d0 a2=3 a3=0 items=0 ppid=1 pid=4984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:51.762318 kernel: audit: type=1300 audit(1746665211.743:1502): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc82247d0 a2=3 a3=0 items=0 ppid=1 pid=4984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:51.762415 kernel: audit: type=1327 audit(1746665211.743:1502): proctitle=737368643A20636F7265205B707269765D May 8 00:46:51.743000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:51.763650 kernel: audit: type=1105 audit(1746665211.757:1503): pid=4984 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.757000 audit[4984]: USER_START pid=4984 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.759000 audit[4986]: CRED_ACQ pid=4986 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.771569 kernel: audit: type=1103 audit(1746665211.759:1504): pid=4986 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.860542 sshd[4984]: pam_unix(sshd:session): session closed for user core May 8 00:46:51.861000 audit[4984]: USER_END pid=4984 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.864145 systemd[1]: sshd@25-10.0.0.60:22-10.0.0.1:49424.service: Deactivated successfully. May 8 00:46:51.864927 systemd[1]: session-26.scope: Deactivated successfully. May 8 00:46:51.865931 systemd-logind[1208]: Session 26 logged out. Waiting for processes to exit. May 8 00:46:51.866877 systemd-logind[1208]: Removed session 26. May 8 00:46:51.861000 audit[4984]: CRED_DISP pid=4984 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.871080 kernel: audit: type=1106 audit(1746665211.861:1505): pid=4984 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.871136 kernel: audit: type=1104 audit(1746665211.861:1506): pid=4984 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:51.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.60:22-10.0.0.1:49424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:52.575997 kubelet[1998]: E0508 00:46:52.575926 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:56.558104 kubelet[1998]: E0508 00:46:56.558060 1998 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:46:56.866480 systemd[1]: Started sshd@26-10.0.0.60:22-10.0.0.1:50812.service. May 8 00:46:56.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.60:22-10.0.0.1:50812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:56.868495 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:46:56.868610 kernel: audit: type=1130 audit(1746665216.865:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.60:22-10.0.0.1:50812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:56.905000 audit[4998]: USER_ACCT pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:56.906623 sshd[4998]: Accepted publickey for core from 10.0.0.1 port 50812 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:46:56.910943 kernel: audit: type=1101 audit(1746665216.905:1509): pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:56.911117 kernel: audit: type=1103 audit(1746665216.910:1510): pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:56.910000 audit[4998]: CRED_ACQ pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:56.911430 sshd[4998]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:46:56.915721 systemd-logind[1208]: New session 27 of user core. May 8 00:46:56.916853 systemd[1]: Started session-27.scope. May 8 00:46:56.918038 kernel: audit: type=1006 audit(1746665216.910:1511): pid=4998 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 8 00:46:56.918093 kernel: audit: type=1300 audit(1746665216.910:1511): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff693257d0 a2=3 a3=0 items=0 ppid=1 pid=4998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:56.910000 audit[4998]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff693257d0 a2=3 a3=0 items=0 ppid=1 pid=4998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:56.910000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:46:56.924325 kernel: audit: type=1327 audit(1746665216.910:1511): proctitle=737368643A20636F7265205B707269765D May 8 00:46:56.924372 kernel: audit: type=1105 audit(1746665216.921:1512): pid=4998 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:56.921000 audit[4998]: USER_START pid=4998 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:56.922000 audit[5000]: CRED_ACQ pid=5000 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:56.932915 kernel: audit: type=1103 audit(1746665216.922:1513): pid=5000 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:57.044307 sshd[4998]: pam_unix(sshd:session): session closed for user core May 8 00:46:57.044000 audit[4998]: USER_END pid=4998 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:57.047226 systemd[1]: sshd@26-10.0.0.60:22-10.0.0.1:50812.service: Deactivated successfully. May 8 00:46:57.048246 systemd[1]: session-27.scope: Deactivated successfully. May 8 00:46:57.049009 systemd-logind[1208]: Session 27 logged out. Waiting for processes to exit. May 8 00:46:57.049985 systemd-logind[1208]: Removed session 27. May 8 00:46:57.044000 audit[4998]: CRED_DISP pid=4998 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:57.053864 kernel: audit: type=1106 audit(1746665217.044:1514): pid=4998 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:57.054051 kernel: audit: type=1104 audit(1746665217.044:1515): pid=4998 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:46:57.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.60:22-10.0.0.1:50812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:46:57.125000 audit[5011]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:57.125000 audit[5011]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffecf4431f0 a2=0 a3=7ffecf4431dc items=0 ppid=2184 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:57.125000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:46:57.134000 audit[5011]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:46:57.134000 audit[5011]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffecf4431f0 a2=0 a3=7ffecf4431dc items=0 ppid=2184 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:46:57.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:47:02.050563 systemd[1]: Started sshd@27-10.0.0.60:22-10.0.0.1:50818.service. May 8 00:47:02.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.60:22-10.0.0.1:50818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.057021 kernel: kauditd_printk_skb: 7 callbacks suppressed May 8 00:47:02.057081 kernel: audit: type=1130 audit(1746665222.049:1519): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.60:22-10.0.0.1:50818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.098000 audit[5015]: USER_ACCT pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:02.099634 sshd[5015]: Accepted publickey for core from 10.0.0.1 port 50818 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:02.102267 sshd[5015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:02.100000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:02.109148 kernel: audit: type=1101 audit(1746665222.098:1520): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:02.109333 kernel: audit: type=1103 audit(1746665222.100:1521): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:02.110738 systemd[1]: Started session-28.scope. May 8 00:47:02.111279 systemd-logind[1208]: New session 28 of user core. May 8 00:47:02.112659 kernel: audit: type=1006 audit(1746665222.100:1522): pid=5015 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 8 00:47:02.100000 audit[5015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe95169760 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:02.118202 kernel: audit: type=1300 audit(1746665222.100:1522): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe95169760 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:02.118267 kernel: audit: type=1327 audit(1746665222.100:1522): proctitle=737368643A20636F7265205B707269765D May 8 00:47:02.100000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:47:02.116000 audit[5015]: USER_START pid=5015 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:02.126090 kernel: audit: type=1105 audit(1746665222.116:1523): pid=5015 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:02.126176 kernel: audit: type=1103 audit(1746665222.117:1524): pid=5017 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:02.117000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:02.280340 sshd[5015]: pam_unix(sshd:session): session closed for user core May 8 00:47:02.280000 audit[5015]: USER_END pid=5015 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:02.283448 systemd[1]: sshd@27-10.0.0.60:22-10.0.0.1:50818.service: Deactivated successfully. May 8 00:47:02.284418 systemd[1]: session-28.scope: Deactivated successfully. May 8 00:47:02.285239 systemd-logind[1208]: Session 28 logged out. Waiting for processes to exit. May 8 00:47:02.286237 systemd-logind[1208]: Removed session 28. May 8 00:47:02.287950 kernel: audit: type=1106 audit(1746665222.280:1525): pid=5015 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:02.280000 audit[5015]: CRED_DISP pid=5015 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:02.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.60:22-10.0.0.1:50818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:02.293959 kernel: audit: type=1104 audit(1746665222.280:1526): pid=5015 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:06.919485 systemd[1]: run-containerd-runc-k8s.io-16ab8882526fd8c92f7b8b412bdcd6b574b362dac22856510b40e564c0ae97cd-runc.KbwZgc.mount: Deactivated successfully. May 8 00:47:07.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.60:22-10.0.0.1:51946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:07.285310 systemd[1]: Started sshd@28-10.0.0.60:22-10.0.0.1:51946.service. May 8 00:47:07.296241 kernel: kauditd_printk_skb: 1 callbacks suppressed May 8 00:47:07.296340 kernel: audit: type=1130 audit(1746665227.283:1528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.60:22-10.0.0.1:51946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:07.388000 audit[5050]: USER_ACCT pid=5050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.392229 sshd[5050]: Accepted publickey for core from 10.0.0.1 port 51946 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:07.395942 sshd[5050]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:07.404219 kernel: audit: type=1101 audit(1746665227.388:1529): pid=5050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.404326 kernel: audit: type=1103 audit(1746665227.393:1530): pid=5050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.393000 audit[5050]: CRED_ACQ pid=5050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.407395 kernel: audit: type=1006 audit(1746665227.393:1531): pid=5050 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 8 00:47:07.406842 systemd[1]: Started session-29.scope. May 8 00:47:07.412202 kernel: audit: type=1300 audit(1746665227.393:1531): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc9539170 a2=3 a3=0 items=0 ppid=1 pid=5050 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:07.393000 audit[5050]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc9539170 a2=3 a3=0 items=0 ppid=1 pid=5050 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:07.407639 systemd-logind[1208]: New session 29 of user core. May 8 00:47:07.393000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:47:07.414161 kernel: audit: type=1327 audit(1746665227.393:1531): proctitle=737368643A20636F7265205B707269765D May 8 00:47:07.415000 audit[5050]: USER_START pid=5050 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.416000 audit[5055]: CRED_ACQ pid=5055 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.437011 kernel: audit: type=1105 audit(1746665227.415:1532): pid=5050 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.437169 kernel: audit: type=1103 audit(1746665227.416:1533): pid=5055 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.598005 sshd[5050]: pam_unix(sshd:session): session closed for user core May 8 00:47:07.597000 audit[5050]: USER_END pid=5050 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.601223 systemd[1]: sshd@28-10.0.0.60:22-10.0.0.1:51946.service: Deactivated successfully. May 8 00:47:07.602067 systemd[1]: session-29.scope: Deactivated successfully. May 8 00:47:07.602724 systemd-logind[1208]: Session 29 logged out. Waiting for processes to exit. May 8 00:47:07.603534 systemd-logind[1208]: Removed session 29. May 8 00:47:07.597000 audit[5050]: CRED_DISP pid=5050 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.632753 kernel: audit: type=1106 audit(1746665227.597:1534): pid=5050 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.632972 kernel: audit: type=1104 audit(1746665227.597:1535): pid=5050 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:07.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.60:22-10.0.0.1:51946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:09.521000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:09.521000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:09.521000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ae8c90 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:47:09.521000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00123df40 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:47:09.521000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:47:09.521000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:47:09.791000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:09.791000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:09.791000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c011142360 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:47:09.791000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c012693110 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:47:09.791000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:47:09.791000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:47:09.791000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:09.791000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00fb7c440 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:47:09.791000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:47:09.791000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:09.791000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c012678020 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:47:09.791000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:47:09.792000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:09.793000 audit[1827]: AVC avc: denied { watch } for pid=1827 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:09.793000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0126932f0 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:47:09.793000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:47:09.792000 audit[1827]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0128018c0 a2=fc6 a3=0 items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c908,c1011 key=(null) May 8 00:47:09.792000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3630002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 8 00:47:12.602245 systemd[1]: Started sshd@29-10.0.0.60:22-10.0.0.1:51962.service. May 8 00:47:12.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.60:22-10.0.0.1:51962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.603421 kernel: kauditd_printk_skb: 25 callbacks suppressed May 8 00:47:12.603564 kernel: audit: type=1130 audit(1746665232.601:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.60:22-10.0.0.1:51962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:12.649000 audit[5088]: USER_ACCT pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.650559 sshd[5088]: Accepted publickey for core from 10.0.0.1 port 51962 ssh2: RSA SHA256:7kNtsjKndXT6BkWKn4/gWKPiKnt49pZMw1UDp15jA9U May 8 00:47:12.652400 sshd[5088]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:47:12.651000 audit[5088]: CRED_ACQ pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.656927 systemd-logind[1208]: New session 30 of user core. May 8 00:47:12.658072 systemd[1]: Started session-30.scope. May 8 00:47:12.661088 kernel: audit: type=1101 audit(1746665232.649:1546): pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.661162 kernel: audit: type=1103 audit(1746665232.651:1547): pid=5088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.661192 kernel: audit: type=1006 audit(1746665232.651:1548): pid=5088 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 May 8 00:47:12.651000 audit[5088]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd92fb3bd0 a2=3 a3=0 items=0 ppid=1 pid=5088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:12.668860 kernel: audit: type=1300 audit(1746665232.651:1548): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd92fb3bd0 a2=3 a3=0 items=0 ppid=1 pid=5088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:47:12.668926 kernel: audit: type=1327 audit(1746665232.651:1548): proctitle=737368643A20636F7265205B707269765D May 8 00:47:12.651000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:47:12.662000 audit[5088]: USER_START pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.675629 kernel: audit: type=1105 audit(1746665232.662:1549): pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.675743 kernel: audit: type=1103 audit(1746665232.664:1550): pid=5090 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.664000 audit[5090]: CRED_ACQ pid=5090 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.806727 sshd[5088]: pam_unix(sshd:session): session closed for user core May 8 00:47:12.807000 audit[5088]: USER_END pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.809749 systemd[1]: sshd@29-10.0.0.60:22-10.0.0.1:51962.service: Deactivated successfully. May 8 00:47:12.810680 systemd[1]: session-30.scope: Deactivated successfully. May 8 00:47:12.811635 systemd-logind[1208]: Session 30 logged out. Waiting for processes to exit. May 8 00:47:12.812420 systemd-logind[1208]: Removed session 30. May 8 00:47:12.807000 audit[5088]: CRED_DISP pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.818317 kernel: audit: type=1106 audit(1746665232.807:1551): pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.818388 kernel: audit: type=1104 audit(1746665232.807:1552): pid=5088 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:47:12.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.60:22-10.0.0.1:51962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:47:13.255747 env[1227]: time="2025-05-08T00:47:13.255690512Z" level=info msg="StopPodSandbox for \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\"" May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.300 [WARNING][5135] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0", GenerateName:"calico-apiserver-66cc78549b-", Namespace:"calico-apiserver", SelfLink:"", UID:"dcfdef5f-11b3-449f-a87e-841d4ef18553", ResourceVersion:"1104", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66cc78549b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62", Pod:"calico-apiserver-66cc78549b-xt5vk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicbf3ae5c832", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.300 [INFO][5135] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.300 [INFO][5135] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" iface="eth0" netns="" May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.300 [INFO][5135] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.300 [INFO][5135] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.321 [INFO][5143] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" HandleID="k8s-pod-network.32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.322 [INFO][5143] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.322 [INFO][5143] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.328 [WARNING][5143] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" HandleID="k8s-pod-network.32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.328 [INFO][5143] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" HandleID="k8s-pod-network.32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.329 [INFO][5143] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:47:13.333026 env[1227]: 2025-05-08 00:47:13.331 [INFO][5135] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:47:13.333680 env[1227]: time="2025-05-08T00:47:13.333073161Z" level=info msg="TearDown network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\" successfully" May 8 00:47:13.333680 env[1227]: time="2025-05-08T00:47:13.333117808Z" level=info msg="StopPodSandbox for \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\" returns successfully" May 8 00:47:13.333680 env[1227]: time="2025-05-08T00:47:13.333621090Z" level=info msg="RemovePodSandbox for \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\"" May 8 00:47:13.333776 env[1227]: time="2025-05-08T00:47:13.333685594Z" level=info msg="Forcibly stopping sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\"" May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.366 [WARNING][5165] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0", GenerateName:"calico-apiserver-66cc78549b-", Namespace:"calico-apiserver", SelfLink:"", UID:"dcfdef5f-11b3-449f-a87e-841d4ef18553", ResourceVersion:"1104", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66cc78549b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eeeaa954c9cec5a7dcabe755568d4a593997518c6c40424e72801717b7255d62", Pod:"calico-apiserver-66cc78549b-xt5vk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicbf3ae5c832", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.367 [INFO][5165] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.367 [INFO][5165] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" iface="eth0" netns="" May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.367 [INFO][5165] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.367 [INFO][5165] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.391 [INFO][5174] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" HandleID="k8s-pod-network.32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.391 [INFO][5174] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.391 [INFO][5174] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.396 [WARNING][5174] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" HandleID="k8s-pod-network.32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.397 [INFO][5174] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" HandleID="k8s-pod-network.32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" Workload="localhost-k8s-calico--apiserver--66cc78549b--xt5vk-eth0" May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.398 [INFO][5174] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:47:13.401464 env[1227]: 2025-05-08 00:47:13.399 [INFO][5165] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd" May 8 00:47:13.402250 env[1227]: time="2025-05-08T00:47:13.401494127Z" level=info msg="TearDown network for sandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\" successfully" May 8 00:47:13.412617 env[1227]: time="2025-05-08T00:47:13.412570092Z" level=info msg="RemovePodSandbox \"32ba0b3426f8927ce4f7fd90f91ff477ac6df1b61d36c9231b3e1f6b2abecccd\" returns successfully" May 8 00:47:13.413115 env[1227]: time="2025-05-08T00:47:13.413056993Z" level=info msg="StopPodSandbox for \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\"" May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.454 [WARNING][5197] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--66j7s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"72562622-3187-4bfb-96bf-cf9ba7859ac7", ResourceVersion:"1096", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2", Pod:"csi-node-driver-66j7s", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic101de8fe21", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.454 [INFO][5197] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.454 [INFO][5197] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" iface="eth0" netns="" May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.454 [INFO][5197] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.454 [INFO][5197] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.481 [INFO][5206] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" HandleID="k8s-pod-network.5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.481 [INFO][5206] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.481 [INFO][5206] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.488 [WARNING][5206] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" HandleID="k8s-pod-network.5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.488 [INFO][5206] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" HandleID="k8s-pod-network.5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.489 [INFO][5206] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:47:13.496239 env[1227]: 2025-05-08 00:47:13.491 [INFO][5197] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:47:13.496239 env[1227]: time="2025-05-08T00:47:13.493702332Z" level=info msg="TearDown network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\" successfully" May 8 00:47:13.496239 env[1227]: time="2025-05-08T00:47:13.493744703Z" level=info msg="StopPodSandbox for \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\" returns successfully" May 8 00:47:13.496239 env[1227]: time="2025-05-08T00:47:13.494409086Z" level=info msg="RemovePodSandbox for \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\"" May 8 00:47:13.496239 env[1227]: time="2025-05-08T00:47:13.494465816Z" level=info msg="Forcibly stopping sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\"" May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.532 [WARNING][5230] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--66j7s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"72562622-3187-4bfb-96bf-cf9ba7859ac7", ResourceVersion:"1096", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f66a291632c899c36036dc78130d160fd054e8096ee1dc03255628ff396c53c2", Pod:"csi-node-driver-66j7s", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic101de8fe21", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.532 [INFO][5230] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.532 [INFO][5230] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" iface="eth0" netns="" May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.532 [INFO][5230] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.532 [INFO][5230] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.555 [INFO][5239] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" HandleID="k8s-pod-network.5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.555 [INFO][5239] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.555 [INFO][5239] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.562 [WARNING][5239] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" HandleID="k8s-pod-network.5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.562 [INFO][5239] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" HandleID="k8s-pod-network.5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" Workload="localhost-k8s-csi--node--driver--66j7s-eth0" May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.563 [INFO][5239] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:47:13.567363 env[1227]: 2025-05-08 00:47:13.565 [INFO][5230] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0" May 8 00:47:13.567363 env[1227]: time="2025-05-08T00:47:13.567328748Z" level=info msg="TearDown network for sandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\" successfully" May 8 00:47:13.571366 env[1227]: time="2025-05-08T00:47:13.571290909Z" level=info msg="RemovePodSandbox \"5a58c61915cd097cb825b9b6b05d6cf949c258be655185bcad1fdc13e9aff3d0\" returns successfully" May 8 00:47:13.571955 env[1227]: time="2025-05-08T00:47:13.571879405Z" level=info msg="StopPodSandbox for \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\"" May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.608 [WARNING][5262] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0", GenerateName:"calico-apiserver-66cc78549b-", Namespace:"calico-apiserver", SelfLink:"", UID:"467966ee-a4de-41f5-a742-c83abaf9be78", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66cc78549b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b", Pod:"calico-apiserver-66cc78549b-4fpbh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic36b60c394f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.608 [INFO][5262] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.608 [INFO][5262] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" iface="eth0" netns="" May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.608 [INFO][5262] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.608 [INFO][5262] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.628 [INFO][5271] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" HandleID="k8s-pod-network.a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.628 [INFO][5271] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.628 [INFO][5271] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.635 [WARNING][5271] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" HandleID="k8s-pod-network.a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.635 [INFO][5271] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" HandleID="k8s-pod-network.a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.637 [INFO][5271] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:47:13.641326 env[1227]: 2025-05-08 00:47:13.639 [INFO][5262] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:47:13.641916 env[1227]: time="2025-05-08T00:47:13.641357723Z" level=info msg="TearDown network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\" successfully" May 8 00:47:13.641916 env[1227]: time="2025-05-08T00:47:13.641393131Z" level=info msg="StopPodSandbox for \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\" returns successfully" May 8 00:47:13.642159 env[1227]: time="2025-05-08T00:47:13.642112540Z" level=info msg="RemovePodSandbox for \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\"" May 8 00:47:13.642210 env[1227]: time="2025-05-08T00:47:13.642168988Z" level=info msg="Forcibly stopping sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\"" May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.677 [WARNING][5295] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0", GenerateName:"calico-apiserver-66cc78549b-", Namespace:"calico-apiserver", SelfLink:"", UID:"467966ee-a4de-41f5-a742-c83abaf9be78", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66cc78549b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61bc77a7c7af8a6b1ec75ec4752638ce4a53d958c2d8aa4a07ac78f84427de0b", Pod:"calico-apiserver-66cc78549b-4fpbh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic36b60c394f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.677 [INFO][5295] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.677 [INFO][5295] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" iface="eth0" netns="" May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.677 [INFO][5295] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.677 [INFO][5295] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.697 [INFO][5304] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" HandleID="k8s-pod-network.a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.697 [INFO][5304] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.697 [INFO][5304] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.703 [WARNING][5304] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" HandleID="k8s-pod-network.a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.703 [INFO][5304] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" HandleID="k8s-pod-network.a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" Workload="localhost-k8s-calico--apiserver--66cc78549b--4fpbh-eth0" May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.705 [INFO][5304] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:47:13.708508 env[1227]: 2025-05-08 00:47:13.706 [INFO][5295] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa" May 8 00:47:13.709152 env[1227]: time="2025-05-08T00:47:13.708517293Z" level=info msg="TearDown network for sandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\" successfully" May 8 00:47:13.712016 env[1227]: time="2025-05-08T00:47:13.711984698Z" level=info msg="RemovePodSandbox \"a04468164b228cc3b169d47a6fa48f125ead5cc52d7d6c508ae33f113c9b70fa\" returns successfully" May 8 00:47:13.712591 env[1227]: time="2025-05-08T00:47:13.712548958Z" level=info msg="StopPodSandbox for \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\"" May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.747 [WARNING][5326] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--7cskf-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc", Pod:"coredns-668d6bf9bc-7cskf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9b7c753285", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.747 [INFO][5326] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.747 [INFO][5326] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" iface="eth0" netns="" May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.747 [INFO][5326] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.747 [INFO][5326] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.766 [INFO][5335] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" HandleID="k8s-pod-network.ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.766 [INFO][5335] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.766 [INFO][5335] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.773 [WARNING][5335] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" HandleID="k8s-pod-network.ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.773 [INFO][5335] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" HandleID="k8s-pod-network.ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.774 [INFO][5335] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:47:13.778357 env[1227]: 2025-05-08 00:47:13.776 [INFO][5326] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:47:13.779286 env[1227]: time="2025-05-08T00:47:13.778390573Z" level=info msg="TearDown network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\" successfully" May 8 00:47:13.779286 env[1227]: time="2025-05-08T00:47:13.778436282Z" level=info msg="StopPodSandbox for \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\" returns successfully" May 8 00:47:13.779286 env[1227]: time="2025-05-08T00:47:13.779030289Z" level=info msg="RemovePodSandbox for \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\"" May 8 00:47:13.779286 env[1227]: time="2025-05-08T00:47:13.779062390Z" level=info msg="Forcibly stopping sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\"" May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.813 [WARNING][5357] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--7cskf-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"f6baf2e2-60ef-4cbb-93ce-02c4a51ebc04", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"59de5b7e81a077c8fc3fb89e746c09eade7552bfa7dfd999371cd28498cdfbdc", Pod:"coredns-668d6bf9bc-7cskf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9b7c753285", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.813 [INFO][5357] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.813 [INFO][5357] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" iface="eth0" netns="" May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.813 [INFO][5357] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.813 [INFO][5357] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.833 [INFO][5365] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" HandleID="k8s-pod-network.ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.833 [INFO][5365] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.833 [INFO][5365] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.839 [WARNING][5365] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" HandleID="k8s-pod-network.ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.839 [INFO][5365] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" HandleID="k8s-pod-network.ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" Workload="localhost-k8s-coredns--668d6bf9bc--7cskf-eth0" May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.840 [INFO][5365] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:47:13.843623 env[1227]: 2025-05-08 00:47:13.842 [INFO][5357] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224" May 8 00:47:13.844406 env[1227]: time="2025-05-08T00:47:13.844356399Z" level=info msg="TearDown network for sandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\" successfully" May 8 00:47:13.848669 env[1227]: time="2025-05-08T00:47:13.848632906Z" level=info msg="RemovePodSandbox \"ef1c561e2a4a170e1b1df62caa8f2b6dae5e7b52eb630fd82d4904c84f91d224\" returns successfully" May 8 00:47:13.971000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:13.971000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:13.971000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e6f020 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:47:13.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:47:13.971000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002722cc0 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:47:13.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:47:13.971000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:13.971000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0023b2040 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:47:13.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 8 00:47:13.971000 audit[1868]: AVC avc: denied { watch } for pid=1868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 8 00:47:13.971000 audit[1868]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002722ce0 a2=fc6 a3=0 items=0 ppid=1711 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c826 key=(null) May 8 00:47:13.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269